
From nobody Tue Jul  3 09:04:03 2018
Return-Path: <agenda@ietf.org>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1003A130F04; Tue,  3 Jul 2018 09:00:21 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <Hannes.Tschofenig@gmx.net>, <oauth-chairs@ietf.org>
Cc: ekr@rtfm.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.81.3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153063362105.4893.8587880355580612205.idtracker@ietfa.amsl.com>
Date: Tue, 03 Jul 2018 09:00:21 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/iyQbqSf5gIt2rIt1qGJ5ZLc_uMU>
Subject: [OAUTH-WG] oauth - Requested sessions have been scheduled for IETF 102
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2018 16:00:31 -0000

Dear Hannes Tschofenig,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


    oauth Session 1 (1:30 requested)
    Tuesday, 17 July 2018, Afternoon Session II 1550-1820
    Room Name: Van Horne size: 130
    ---------------------------------------------
    oauth Session 2 (1:30 requested)
    Thursday, 19 July 2018, Morning Session I 0930-1200
    Room Name: Van Horne size: 130
    ---------------------------------------------

Special Note: 1550 - 1720

iCalendar: https://datatracker.ietf.org/meeting/102/sessions/oauth.ics

Request Information:


---------------------------------------------------------
Working Group Name: Web Authorization Protocol
Area Name: Security Area
Session Requester: Hannes Tschofenig

Number of Sessions: 2
Length of Session(s):  1.5 Hours, 1.5 Hours
Number of Attendees: 50
Conflicts to Avoid: 
 First Priority: secevent teep suit core tls ace sipcore acme tokbind




People who must be present:
  Eric Rescorla
  Hannes Tschofenig
  Rifaat Shekh-Yusef

Resources Requested:

Special Requests:
  
---------------------------------------------------------


From nobody Tue Jul  3 12:46:23 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7617E130DFB for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 12:46:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J4US2OAP8qut for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 12:46:17 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10070.outbound.protection.outlook.com [40.107.1.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83C2D130DF6 for <oauth@ietf.org>; Tue,  3 Jul 2018 12:46:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lEJckt8PNrEiRz0rLqCvbpQpHIfQ/DRL3VI7038N82o=; b=f6178OVu6Q7QsEkPubm/4RShbEM0pjSmgrQ0+pkPPLM5pujvD1U6l0U1VsOSU1/yWx8F+QXVO0cWnVla4tP7vzOk0ddOcpopyrjVsTi3kX2PeSrE36Rgx2d1ZhvE1X4yq0PZulo5jn9mf5kKKKDZ5GLBbmPRzCeRYR0kJljH2+s=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1518.eurprd08.prod.outlook.com (10.167.210.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.906.26; Tue, 3 Jul 2018 19:46:13 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0906.026; Tue, 3 Jul 2018 19:46:13 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: PoP Key Distribution
Thread-Index: AdQTBj47ZlOcOW2pSHSpIBiWadk6Fg==
Date: Tue, 3 Jul 2018 19:46:12 +0000
Message-ID: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [80.92.118.234]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1518; 7:qz2rSRDk+XOvKr/ph/Dspw+8/mmbDT6e1c+MfLnVqUWmPeHlYR3BV2D32KHYXZffg2lvHCw+uvMzVoYkcMoiap/O8h8+e5zRZENqH3Ku/f9rOT0/AUFwO1Hy/pM/Xc0qWmh5m2xELIBpAUVvQ9G3OoDec/pTYMLn31E93nFusGaGyrEZEEF7RI1fW1852gMwp9xdADiwsyXLfGlmMoVOImMmND52VelnIlC8dtiK43fwB6Of86KuMSD9hB/t8ZIt
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 95f724c6-a04d-46d8-eefb-08d5e11da1ff
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1518; 
x-ms-traffictypediagnostic: VI1PR0801MB1518:
x-microsoft-antispam-prvs: <VI1PR0801MB15184F2F8CC2097B58F0F377FA420@VI1PR0801MB1518.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231254)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123558120)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1518; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1518; 
x-forefront-prvs: 0722981D2A
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(136003)(39860400002)(346002)(366004)(396003)(199004)(40434004)(53754006)(189003)(7696005)(72206003)(26005)(2906002)(6916009)(478600001)(2351001)(186003)(6506007)(81156014)(68736007)(5630700001)(3480700004)(55016002)(86362001)(966005)(5250100002)(54896002)(14454004)(6306002)(476003)(236005)(6436002)(102836004)(9686003)(8676002)(486006)(99286004)(8936002)(1730700003)(3846002)(5640700003)(33656002)(790700001)(74316002)(105586002)(2501003)(106356001)(7736002)(97736004)(606006)(5660300001)(6116002)(66066001)(2900100001)(25786009)(81166006)(316002)(7116003)(14444005)(5024004)(256004)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1518; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 7O5VJB8dNo6YmaBfLVKd3lWuW3MQ9J6vj/19lFnvhEyI2EPs9el5e41VJD8MWdPPfP3edr1rxPWfrQI8Tao1iy8rIV4XOXGrrLFusMopMZRBSXvT9mG/F5JN1eP9p3LivU5hSUdeLS7PMXeEO7UU/2OdmVEPBjQ1X8dgg3O87L/vnf/sTvehxHgeYQpz56vHgB6lKKQJUEeC3+mAjI9AcgBq0dS3vIGoDCQIELUll6UVL0OyQI2IRdH8lvIssvVngIsR+S/+9hYXjpCURDFuVnmf+Luys9k25ukoGOqmpG02G7S5HqO7ScB7OlXEgVHCoNRCqPzw0IUD0xRYBj+ERvPbRXAvtVyGRwgOIXBjYf4=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB211213D11E7820FD31218663FA420VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 95f724c6-a04d-46d8-eefb-08d5e11da1ff
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2018 19:46:12.9848 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1518
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7kIXI1Xe24XwNOSpCAia37cqvlc>
Subject: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2018 19:46:21 -0000

--_000_VI1PR0801MB211213D11E7820FD31218663FA420VI1PR0801MB2112_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi all,

we have been working on an update for the draft-ietf-oauth-pop-key-distribu=
tion document in time for the deadline but we noticed several issues that a=
re worthwhile to bring to your attention.

draft-ietf-oauth-pop-key-distribution defines a mechanism that allows the c=
lient to talk to the AS to request a PoP access token and associated keying=
 material.

There are two other groups in the IETF where this concept is used.


=B7         The guys working on RTCWEB is the first. Misi (M=E9sz=E1ros Mih=
=E1ly) has been helping us to understand their needs. They have defined the=
ir own token format, which has been posted on the OAuth group a while ago f=
or review.


=B7         The other group is ACE with their work on an OAuth-based profil=
e for IoT.

Where should the parameters needed for PoP key distribution should be defin=
ed? Currently, they are defined in two places -- in https://tools.ietf.org/=
html/draft-ietf-ace-oauth-authz-13 and also in https://tools.ietf.org/html/=
draft-ietf-oauth-pop-key-distribution-03. In particular, the audience and t=
he token_type parameters are defined in both specs.

IMHO it appears that OAuth would be the best place to define the HTTP-based=
 parameters. ACE could define the IoT-based protocols, such as CoAP, MQTT, =
and alike. Of course, this is subject for discussion, particularly if there=
 is no interest in doing so in the OAuth working group.

There is also a misalignment in terms of the content. draft-ietf-oauth-pop-=
key-distribution defined an 'alg' parameter, which does not exist in the dr=
aft-ietf-ace-oauth-authz document. The draft-ietf-ace-oauth-authz document =
does, however, have a profile parameter, which does not exist in draft-ietf=
-oauth-pop-key-distribution. Some alignment is therefore needed. In the mea=
nwhile the work on OAuth meta has been finalized and could potentially be r=
e-used.

When the work on draft-ietf-oauth-pop-key-distribution was initially starte=
d there was only a single, standardized token format, namely the JWT. Hence=
, it appeared reasonable to use the JWT keying structure for delivering key=
ing material from the AS to the client.

In the meanwhile two other formats have been standardized, namely RFC 7635 =
and the CWT. For use with those specs it appears less ideal to transport ke=
ys from the AS to the client using the JSON/JOSE-based format. It would be =
more appropriate to use whatever PoP token format is used instead. Currentl=
y, this hasn't been considered yet.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB211213D11E7820FD31218663FA420VI1PR0801MB2112_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:m=3D"http://sc=
hemas.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-=
html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:706375170;
	mso-list-type:hybrid;
	mso-list-template-ids:1105634158 794965186 134807555 134807557 134807553 1=
34807555 134807557 134807553 134807555 134807557;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New","serif";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New","serif";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New","serif";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">we have been working on an update for the draft-ietf=
-oauth-pop-key-distribution document in time for the deadline but we notice=
d several issues that are worthwhile to bring to your attention.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">draft-ietf-oauth-pop-key-distribution defines a mech=
anism that allows the client to talk to the AS to request a PoP access toke=
n and associated keying material.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There are two other groups in the IETF where this co=
ncept is used.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">=B7<span style=3D"font:7.0pt &quot;Times New Roman&qu=
ot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>The guys working on RTCWEB is the first. Mis=
i (M=E9sz=E1ros Mih=E1ly) has been helping us to understand their needs. Th=
ey have defined their own token format, which has been posted on the OAuth =
group a while ago for review.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">=B7<span style=3D"font:7.0pt &quot;Times New Roman&qu=
ot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>The other group is ACE with their work on an=
 OAuth-based profile for IoT.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Where should the parameters needed for PoP key distr=
ibution should be defined? Currently, they are defined in two places -- in
<a href=3D"https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13">https=
://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13</a> and also in
<a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distributio=
n-03">https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03<=
/a>. In particular, the audience and the token_type parameters are defined =
in both specs.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">IMHO it appears that OAuth would be the best place t=
o define the HTTP-based parameters. ACE could define the IoT-based protocol=
s, such as CoAP, MQTT, and alike. Of course, this is subject for discussion=
, particularly if there is no interest
 in doing so in the OAuth working group. <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There is also a misalignment in terms of the content=
. draft-ietf-oauth-pop-key-distribution defined an 'alg' parameter, which d=
oes not exist in the draft-ietf-ace-oauth-authz document. The draft-ietf-ac=
e-oauth-authz document does, however,
 have a profile parameter, which does not exist in draft-ietf-oauth-pop-key=
-distribution. Some alignment is therefore needed. In the meanwhile the wor=
k on OAuth meta has been finalized and could potentially be re-used.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">When the work on draft-ietf-oauth-pop-key-distributi=
on was initially started there was only a single, standardized token format=
, namely the JWT. Hence, it appeared reasonable to use the JWT keying struc=
ture for delivering keying material
 from the AS to the client. <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In the meanwhile two other formats have been standar=
dized, namely RFC 7635 and the CWT. For use with those specs it appears les=
s ideal to transport keys from the AS to the client using the JSON/JOSE-bas=
ed format. It would be more appropriate
 to use whatever PoP token format is used instead. Currently, this hasn't b=
een considered yet.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB211213D11E7820FD31218663FA420VI1PR0801MB2112_--


From nobody Tue Jul  3 13:11:10 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12C04130FF3 for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 13:11:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KGrPGLQPKu4n for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 13:10:55 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640122.outbound.protection.outlook.com [40.107.64.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C060130E75 for <oauth@ietf.org>; Tue,  3 Jul 2018 13:10:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BLjmhdayb/bcp1eK1iBk3VVbtyoFBL1LOt3JOE2Nf+k=; b=c1I0n/9Rpf670BuNLczFWQh5LwItZ3/IIS3XukqTPDYieiGjobD4U9reZqjGylrkKbv4CNA04dficUjxfL9Oi4Hed8c1zysb9cmrIm9cMJrdZ+scw3Ztgtyc85hPDBwHLd5n7NZYzPW+PyfF1vEqWLKVvXGpsq83GOFbeCsvisE=
Received: from DM5PR00MB0293.namprd00.prod.outlook.com (52.132.128.34) by DM5PR00MB0438.namprd00.prod.outlook.com (52.132.129.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.967.0; Tue, 3 Jul 2018 20:10:52 +0000
Received: from DM5PR00MB0293.namprd00.prod.outlook.com ([fe80::4585:e342:2207:ca93]) by DM5PR00MB0293.namprd00.prod.outlook.com ([fe80::4585:e342:2207:ca93%4]) with mapi id 15.20.0967.000; Tue, 3 Jul 2018 20:10:52 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: PoP Key Distribution
Thread-Index: AdQTBj47ZlOcOW2pSHSpIBiWadk6FgAA3/bg
Date: Tue, 3 Jul 2018 20:10:52 +0000
Message-ID: <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com>
In-Reply-To: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.47.80.188]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR00MB0438; 6:6bk1n0sAd5r0GwUPvqTOivJPtKccvRyIrPOUwgJJstYxzJN0GWEsB11KqaAVzjXGR0YJizAt2um09qsBKWI0DhtX25unnLdh9KchJMApW/fAeWiF/MJieXciH2ET/UTpWxBJn7H6xkGlIx96sdVymN5n3/gpiBrSnMH6k19IImmsTLoerzW/KJ0NdyZIKZLo9//coQ0OsNLHUFGAAz5lGf8hLzD3ONRtTtsMBc2ceQWp2pCx95OQizbchumUSZqd7AWhChM3XAvk4jNnSHAVF55pd9zO2ykFuhewdNGhxAAo5WVzV81o/yxabEw9jZwA6nEZJLShwOXF3j6VkSpPchQEB4SdAmPig9r86XLigllv4rObP2LV/8Zq5ZWZxRIMiT7EpjQt/5PEb4hOjYYKiLDrXZYS8REPziOucGX2U5BueFIXXjcRv3EqE3wf/G19n3eDMNwR2UfRoXabdyV/lw==; 5:9O+ew5dyVUjLl4/Ig9wKzylSMDefY2wfJBI97kFbIPgNKEpmdR+dM+Zlt5byHKwvlGst3DJsvuw4CKFD/TyaMwgb5sydNmNxjLjXjDiwLok1OtBIJqUZHbBcIowFfh5xckGMe1POkiQPnLqCRGQcYso/zVzJQAnZyx/bPS72W70=; 7:gZdFQXbkoJmV/AbDXXcrMB5zGElrtDSSMvn3F13VnHs5JBA4LGvG5PVls/HHkRE5O/itwDe16/qVijjIAkPxa9/4iih3Me7aMMJE9LGczMzEJ3vwB+A5nA+3w27okdVO6M6EZuFrm1lRvUx7BS/QXdyQ1sAdUuEG2t3LRO5l5juPCnNbDinZYPjmC+Q34iLTECuHPT397OM0Tdo7UvjAF+ygnBMSjGBBehmadmG6uRqd2yYQm5UovxHb2Js49k1v
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 11157406-f59d-4e64-ed35-08d5e12113f4
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:(223705240517415); BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:DM5PR00MB0438; 
x-ms-traffictypediagnostic: DM5PR00MB0438:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-microsoft-antispam-prvs: <DM5PR00MB0438B7AC983037C2FA2F8217F5420@DM5PR00MB0438.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(8121501046)(5005006)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3002001)(3231280)(2018427008)(944501410)(52105095)(10201501046)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123560045)(20161123562045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:DM5PR00MB0438; BCL:0; PCL:0; RULEID:; SRVR:DM5PR00MB0438; 
x-forefront-prvs: 0722981D2A
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(136003)(396003)(376002)(366004)(53754006)(40434004)(189003)(199004)(8936002)(81166006)(10290500003)(790700001)(81156014)(3480700004)(8676002)(97736004)(86612001)(5250100002)(478600001)(68736007)(6116002)(3846002)(7736002)(6506007)(6246003)(53546011)(25786009)(8990500004)(256004)(6436002)(5024004)(14444005)(66066001)(102836004)(10090500001)(53936002)(76176011)(229853002)(7696005)(86362001)(99286004)(186003)(26005)(6306002)(11346002)(446003)(14454004)(9686003)(22452003)(105586002)(316002)(55016002)(2906002)(966005)(106356001)(72206003)(74316002)(7116003)(476003)(5660300001)(2900100001)(19609705001)(2501003)(486006)(236005)(54896002)(110136005)(606006)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR00MB0438; H:DM5PR00MB0293.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: vniEqEMGgacEMeVdbsWA/2m/S3wL9DyerQ1Y1FiOTbfV7w7I1ZrkX/b7LdULkbzvYTEXWba52njtIjqOyrFsk5O6cdmeLXEErOLXquCAWPBunI2snp4n1YWKgfjXNwhRnNYBf8StQbe3k05Ihz/GZTznaeAoSjpLlWz6lgZCWNe0VOaduKtcVykMBGaYtVnMfJtoPrYb2/ZQkMzsLdcPb1IGUobrcldWmHC92leuoJBYa1cxH/BmwiNAU3iuAv7TuKNvTDpBSf3nceEMiNJoe8meMkQRQr9gvWaN5VNJUzPlWfOde+HHp68cqG6klWRll7Jedet9Xr5Zmzhp6OApMOpeqqJooeo312PbUgeJHrg=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR00MB029359EBBE81D3899BEA34FBF5420DM5PR00MB0293namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 11157406-f59d-4e64-ed35-08d5e12113f4
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2018 20:10:52.6641 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR00MB0438
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/M03BrlHJgAzEQETMm5zVHBwMrzw>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2018 20:11:08 -0000

--_000_DM5PR00MB029359EBBE81D3899BEA34FBF5420DM5PR00MB0293namp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Thanks for working these issues, Hannes.  I agree with your conclusion that=
 the OAuth PoP Key Distribution spec should define the OAuth parameters for=
 use with HTTP and the ACE OAuth profile should define those that are ACE-s=
pecific.  Therefore, we should encourage ACE spec to remove the duplicate d=
efinitions and instead reference those in the OAuth spec.

I believe that the ACE "profile" parameter is typically unnecessary and not=
 in the spirit of normal OAuth.  Configuration information between OAuth pa=
rticipants is typically configured out of band and/or retrieved from the AS=
 Discovery document (per the newly minted RFC 8414<https://tools.ietf.org/h=
tml/rfc8414>). There's no need to dynamically exchange a profile identifier=
 when this is essentially always known in advance.  We should not include "=
profile".  For that matter, ACE should delete it as well, as it certainly i=
sn't appropriate in constrained environments.

We should think some more about how we want to treat the function of the "a=
lg" parameter and how to fully specify things for JWTs (an OAuth WG spec) w=
hile still enabling other representations when appropriate.

                                                       Thanks,
                                                       -- Mike

From: OAuth <oauth-bounces@ietf.org> On Behalf Of Hannes Tschofenig
Sent: Tuesday, July 3, 2018 12:46 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] PoP Key Distribution

Hi all,

we have been working on an update for the draft-ietf-oauth-pop-key-distribu=
tion document in time for the deadline but we noticed several issues that a=
re worthwhile to bring to your attention.

draft-ietf-oauth-pop-key-distribution defines a mechanism that allows the c=
lient to talk to the AS to request a PoP access token and associated keying=
 material.

There are two other groups in the IETF where this concept is used.


  *   The guys working on RTCWEB is the first. Misi (M=E9sz=E1ros Mih=E1ly)=
 has been helping us to understand their needs. They have defined their own=
 token format, which has been posted on the OAuth group a while ago for rev=
iew.


  *   The other group is ACE with their work on an OAuth-based profile for =
IoT.

Where should the parameters needed for PoP key distribution should be defin=
ed? Currently, they are defined in two places -- in https://tools.ietf.org/=
html/draft-ietf-ace-oauth-authz-13 and also in https://tools.ietf.org/html/=
draft-ietf-oauth-pop-key-distribution-03. In particular, the audience and t=
he token_type parameters are defined in both specs.

IMHO it appears that OAuth would be the best place to define the HTTP-based=
 parameters. ACE could define the IoT-based protocols, such as CoAP, MQTT, =
and alike. Of course, this is subject for discussion, particularly if there=
 is no interest in doing so in the OAuth working group.

There is also a misalignment in terms of the content.. draft-ietf-oauth-pop=
-key-distribution defined an 'alg' parameter, which does not exist in the d=
raft-ietf-ace-oauth-authz document. The draft-ietf-ace-oauth-authz document=
 does, however, have a profile parameter, which does not exist in draft-iet=
f-oauth-pop-key-distribution. Some alignment is therefore needed. In the me=
anwhile the work on OAuth meta has been finalized and could potentially be =
re-used.

When the work on draft-ietf-oauth-pop-key-distribution was initially starte=
d there was only a single, standardized token format, namely the JWT. Hence=
, it appeared reasonable to use the JWT keying structure for delivering key=
ing material from the AS to the client.

In the meanwhile two other formats have been standardized, namely RFC 7635 =
and the CWT. For use with those specs it appears less ideal to transport ke=
ys from the AS to the client using the JSON/JOSE-based format. It would be =
more appropriate to use whatever PoP token format is used instead. Currentl=
y, this hasn't been considered yet.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_DM5PR00MB029359EBBE81D3899BEA34FBF5420DM5PR00MB0293namp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:706375170;
	mso-list-type:hybrid;
	mso-list-template-ids:1105634158 794965186 134807555 134807557 134807553 1=
34807555 134807557 134807553 134807555 134807557;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">Thanks for working the=
se issues, Hannes.&nbsp; I agree with your conclusion that the OAuth PoP Ke=
y Distribution spec should define the OAuth parameters for use with HTTP an=
d the ACE OAuth profile should define those
 that are ACE-specific.&nbsp; Therefore, we should encourage ACE spec to re=
move the duplicate definitions and instead reference those in the OAuth spe=
c.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">I believe that the ACE=
 &#8220;profile&#8221; parameter is typically unnecessary and not in the sp=
irit of normal OAuth.&nbsp; Configuration information between OAuth partici=
pants is typically configured out of band and/or retrieved
 from the AS Discovery document (per the newly minted <a href=3D"https://to=
ols.ietf.org/html/rfc8414">
RFC 8414</a>). There&#8217;s no need to dynamically exchange a profile iden=
tifier when this is essentially always known in advance.&nbsp; We should no=
t include &#8220;profile&#8221;.&nbsp; For that matter, ACE should delete i=
t as well, as it certainly isn&#8217;t appropriate in constrained
 environments.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">We should think some m=
ore about how we want to treat the function of the &#8220;alg&#8221; parame=
ter and how to fully specify things for JWTs (an OAuth WG spec) while still=
 enabling other representations when appropriate.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; Thanks,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;oauth-bounces@ietf.org&gt; <b=
>On Behalf Of </b>
Hannes Tschofenig<br>
<b>Sent:</b> Tuesday, July 3, 2018 12:46 PM<br>
<b>To:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] PoP Key Distribution<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hi all, <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">we have been working on an upda=
te for the draft-ietf-oauth-pop-key-distribution document in time for the d=
eadline but we noticed several issues that are worthwhile to bring to your =
attention.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">draft-ietf-oauth-pop-key-distri=
bution defines a mechanism that allows the client to talk to the AS to requ=
est a PoP access token and associated keying material.<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">There are two other groups in t=
he IETF where this concept is used.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li class=3D"MsoListParagraph" style=3D"margin-left:0in;mso-list:l0 level1 =
lfo2"><span lang=3D"EN-GB">The guys working on RTCWEB is the first. Misi (M=
=E9sz=E1ros Mih=E1ly) has been helping us to understand their needs. They h=
ave defined their own token format, which has
 been posted on the OAuth group a while ago for review. <o:p></o:p></span><=
/li></ul>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li class=3D"MsoListParagraph" style=3D"margin-left:0in;mso-list:l0 level1 =
lfo2"><span lang=3D"EN-GB">The other group is ACE with their work on an OAu=
th-based profile for IoT.
<o:p></o:p></span></li></ul>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Where should the parameters nee=
ded for PoP key distribution should be defined? Currently, they are defined=
 in two places -- in
<a href=3D"https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13">https=
://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13</a> and also in
<a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distributio=
n-03">https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03<=
/a>. In particular, the audience and the token_type parameters are defined =
in both specs.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">IMHO it appears that OAuth woul=
d be the best place to define the HTTP-based parameters. ACE could define t=
he IoT-based protocols, such as CoAP, MQTT, and alike. Of course, this is s=
ubject for discussion, particularly
 if there is no interest in doing so in the OAuth working group. <o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">There is also a misalignment in=
 terms of the content.. draft-ietf-oauth-pop-key-distribution defined an 'a=
lg' parameter, which does not exist in the draft-ietf-ace-oauth-authz docum=
ent. The draft-ietf-ace-oauth-authz
 document does, however, have a profile parameter, which does not exist in =
draft-ietf-oauth-pop-key-distribution. Some alignment is therefore needed. =
In the meanwhile the work on OAuth meta has been finalized and could potent=
ially be re-used.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">When the work on draft-ietf-oau=
th-pop-key-distribution was initially started there was only a single, stan=
dardized token format, namely the JWT. Hence, it appeared reasonable to use=
 the JWT keying structure for delivering
 keying material from the AS to the client. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">In the meanwhile two other form=
ats have been standardized, namely RFC 7635 and the CWT. For use with those=
 specs it appears less ideal to transport keys from the AS to the client us=
ing the JSON/JOSE-based format. It would
 be more appropriate to use whatever PoP token format is used instead. Curr=
ently, this hasn't been considered yet.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Ciao<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hannes<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">IMPORTANT NOTICE: The contents =
of this email and any attachments are confidential and may also be privileg=
ed. If you are not the intended recipient, please notify the sender immedia=
tely and do not disclose the contents
 to any other person, use it for any purpose, or store or copy the informat=
ion in any medium. Thank you.
<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_DM5PR00MB029359EBBE81D3899BEA34FBF5420DM5PR00MB0293namp_--


From nobody Tue Jul  3 23:37:22 2018
Return-Path: <ludwig.seitz@ri.se>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B82E130EB4 for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 23:37:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id smBhYxUJrOpm for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 23:37:17 -0700 (PDT)
Received: from smtp-out11.electric.net (smtp-out11.electric.net [185.38.181.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A10EB130DD7 for <oauth@ietf.org>; Tue,  3 Jul 2018 23:37:17 -0700 (PDT)
Received: from 1fabPf-000S0l-TD by out11d.electric.net with emc1-ok (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabPf-000S1w-U1 for oauth@ietf.org; Tue, 03 Jul 2018 23:37:15 -0700
Received: by emcmailer; Tue, 03 Jul 2018 23:37:15 -0700
Received: from [194.218.146.197] (helo=sp-mail-2.sp.se) by out11d.electric.net with esmtps (TLSv1.2:ECDHE-RSA-AES128-SHA256:128) (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabPf-000S0l-TD for oauth@ietf.org; Tue, 03 Jul 2018 23:37:15 -0700
Received: from [192.168.0.166] (10.116.0.226) by sp-mail-2.sp.se (10.100.0.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Wed, 4 Jul 2018 08:37:14 +0200
To: <oauth@ietf.org>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
From: Ludwig Seitz <ludwig.seitz@ri.se>
Message-ID: <67ab6c51-4299-b433-01f0-cd023574175a@ri.se>
Date: Wed, 4 Jul 2018 08:37:09 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [10.116.0.226]
X-ClientProxiedBy: sp-mail-3.sp.se (10.100.0.163) To sp-mail-2.sp.se (10.100.0.162)
X-Outbound-IP: 194.218.146.197
X-Env-From: ludwig.seitz@ri.se
X-Proto: esmtps
X-Revdns: 
X-HELO: sp-mail-2.sp.se
X-TLS: TLSv1.2:ECDHE-RSA-AES128-SHA256:128
X-Authenticated_ID: 
X-PolicySMART: 14510320
X-Virus-Status: Scanned by VirusSMART (c)
X-Virus-Status: Scanned by VirusSMART (s)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Zmpr_gQwfv9h_QjDShdwkjT2HqM>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jul 2018 06:37:21 -0000

On 2018-07-03 22:10, Mike Jones wrote:

> 
> I believe that the ACE “profile” parameter is typically unnecessary and 
> not in the spirit of normal OAuth.  Configuration information between 
> OAuth participants is typically configured out of band and/or retrieved 
> from the AS Discovery document (per the newly minted RFC 8414 
> <https://tools.ietf.org/html/rfc8414>). There’s no need to dynamically 
> exchange a profile identifier when this is essentially always known in 
> advance.  We should not include “profile”.  For that matter, ACE should 
> delete it as well, as it certainly isn’t appropriate in constrained 
> environments.
>

I strongly disagree with this statement. First of all let me correct a 
misconception you seem to have: RFC 8414 is about AS metadata, while 
"profile" is RS metadata, so unless I've overlooked something, RFC 8414 
is not applicable.
The "profile" parameter tells a client which communication security 
method to use with the RS (e.g. TLS) and how to perform the 
proof-of-possession of a token towards an RS (e.g. TLS client 
authentication).
When you take the work on proof-of-possession into account, that feels 
very much in the spirit of OAuth.

Second: the "profile" parameter is optional, so if it is already known 
because it was configured out of band or discovered somehow you just 
don't send it.

Finally: Profile is intended for use cases were mobile clients and RS 
dynamically join and leave a network, so that pre-configuring clients 
with metadata about the RS is difficult. Do you have a better idea how 
to solve these cases?


/Ludwig

-- 
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51


From nobody Tue Jul  3 23:55:57 2018
Return-Path: <ludwig.seitz@ri.se>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8018C130E3C for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 23:55:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UcZm3-QFh-ln for <oauth@ietfa.amsl.com>; Tue,  3 Jul 2018 23:55:52 -0700 (PDT)
Received: from smtp-out10.electric.net (smtp-out10.electric.net [185.38.180.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5E4D120049 for <oauth@ietf.org>; Tue,  3 Jul 2018 23:55:51 -0700 (PDT)
Received: from 1fabhb-000EJJ-Ti by out10b.electric.net with emc1-ok (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabhb-000EKS-UY for oauth@ietf.org; Tue, 03 Jul 2018 23:55:47 -0700
Received: by emcmailer; Tue, 03 Jul 2018 23:55:47 -0700
Received: from [194.218.146.197] (helo=sp-mail-2.sp.se) by out10b.electric.net with esmtps (TLSv1.2:ECDHE-RSA-AES128-SHA256:128) (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabhb-000EJJ-Ti for oauth@ietf.org; Tue, 03 Jul 2018 23:55:47 -0700
Received: from [192.168.0.166] (10.116.0.226) by sp-mail-2.sp.se (10.100.0.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Wed, 4 Jul 2018 08:55:47 +0200
To: <oauth@ietf.org>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com>
From: Ludwig Seitz <ludwig.seitz@ri.se>
Message-ID: <58eac9f9-21a6-aa6d-ac28-6fce70cfa08e@ri.se>
Date: Wed, 4 Jul 2018 08:55:46 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Originating-IP: [10.116.0.226]
X-ClientProxiedBy: sp-mail-3.sp.se (10.100.0.163) To sp-mail-2.sp.se (10.100.0.162)
X-Outbound-IP: 194.218.146.197
X-Env-From: ludwig.seitz@ri.se
X-Proto: esmtps
X-Revdns: 
X-HELO: sp-mail-2.sp.se
X-TLS: TLSv1.2:ECDHE-RSA-AES128-SHA256:128
X-Authenticated_ID: 
X-PolicySMART: 14510320
X-Virus-Status: Scanned by VirusSMART (c)
X-Virus-Status: Scanned by VirusSMART (s)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ipINVtLayDOA91TrQ6J0qk8sWr8>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jul 2018 06:55:55 -0000

On 2018-07-03 21:46, Hannes Tschofenig wrote:
> Hi all,
> 
...
> Where should the parameters needed for PoP key distribution should be 
> defined? Currently, they are defined in two places -- in 
> https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13 and also in 
> https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03. In 
> particular, the audience and the token_type parameters are defined in 
> both specs.
> 
> IMHO it appears that OAuth would be the best place to define the 
> HTTP-based parameters. ACE could define the IoT-based protocols, such as 
> CoAP, MQTT, and alike. Of course, this is subject for discussion, 
> particularly if there is no interest in doing so in the OAuth working 
> group.
> 

I fully agree that OAuth would be the best place. I've only drawn some 
of these parameters into draft-ietf-ace-oauth-authz because the work on
draft-ietf-oauth-pop-key-distribution seemed to have been discontinued 
(it expired August 2017).
That said, I'd hate to introduce a normative dependency into 
draft-ietf-ace-oauth-authz on a document that will not move forward or 
only move very slowly. What are the prospects of going forward quickly 
with draft-ietf-oauth-pop-key-distribution?

> There is also a misalignment in terms of the content.. 
> draft-ietf-oauth-pop-key-distribution defined an 'alg' parameter, which 
> does not exist in the draft-ietf-ace-oauth-authz document. The 
> draft-ietf-ace-oauth-authz document does, however, have a profile 
> parameter, which does not exist in 
> draft-ietf-oauth-pop-key-distribution. Some alignment is therefore 
> needed. In the meanwhile the work on OAuth meta has been finalized and 

It seems indeed that 'alg' and 'profile' parameters have some overlap, 
although 'alg' seemed a bit more narrow to me (which is why I created 
'profile').  If we could extend the definition of 'alg' a bit, I'd be OK
to remove 'profile' from the ACE draft (provided the OAuth draft moves 
forward in a timely manner).


/Ludwig

-- 
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51


From nobody Wed Jul  4 14:47:08 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7ADC5130E13 for <oauth@ietfa.amsl.com>; Wed,  4 Jul 2018 14:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level: 
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YrQejCfj93vc for <oauth@ietfa.amsl.com>; Wed,  4 Jul 2018 14:47:03 -0700 (PDT)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EC51131048 for <oauth@ietf.org>; Wed,  4 Jul 2018 14:47:03 -0700 (PDT)
X-AuditID: 1209190e-4e1ff70000006518-b4-5b3d40565253
Received: from mailhub-auth-3.mit.edu ( [18.9.21.43]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id 99.1B.25880.6504D3B5; Wed,  4 Jul 2018 17:47:02 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-3.mit.edu (8.13.8/8.9.2) with ESMTP id w64Ll0QZ022698; Wed, 4 Jul 2018 17:47:01 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w64LkvkE005963 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 4 Jul 2018 17:46:59 -0400
Date: Wed, 4 Jul 2018 16:46:57 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Message-ID: <20180704214654.GK60996@kduck.kaduk.org>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrGIsWRmVeSWpSXmKPExsUixCmqrRvmYBttcOq2lEXDl9VMFiffvmJz YPI4sewKq8eSJT+ZApiiuGxSUnMyy1KL9O0SuDJ6dl9gK1jJWbFn4k22BsZz7F2MHBwSAiYS h87ldjFycQgJLGaSmN7YxgjhbGCU6Fy0iQnCucIkcXzRTpYuRk4OFgEViebt79lBbDYgu6H7 MjOILSJgK/H70F6wGmYBVYkvC94zgdjCAjoSjzbeB4vzAm17d2MbG4gtJLCZUeLmDWuIuKDE yZlPoHq1JG78e8kEch2zgLTE8n8cIGFOgViJ7i37wFpFBZQl9vYdYp/AKDALSfcsJN2zELoX MDKvYpRNya3SzU3MzClOTdYtTk7My0st0jXWy80s0UtNKd3ECA5SSb4djJMavA8xCnAwKvHw 3jhtEy3EmlhWXJl7iFGSg0lJlFd+o3W0EF9SfkplRmJxRnxRaU5q8SFGCQ5mJRFeVXHbaCHe lMTKqtSifJiUNAeLkjhv9iLGaCGB9MSS1OzU1ILUIpisDAeHkgSvkz1Qo2BRanpqRVpmTglC momDE2Q4D9Dw+3Ygw4sLEnOLM9Mh8qcYdTn+vJ86iVmIJS8/L1VKnJcDZJAASFFGaR7cHFBy kcjeX/OKURzoLWHeQJAqHmBigpv0CmgJE9CSnm2WIEtKEhFSUg2MhzO+7Ulj3sutV5n9Jotv Z9Oy074TNnc9O9F36r/S8nnCMyeKhzWcVbkfMuNKe2MUW863gDityL2/5LziPHLtOKd+mCGg blz275/iZFFWEYGmVSJK70Iu2rw+psH04IbbP4dL09+lHQhetHwPv2/YLJkrH1t2aGh5hntV nfeYc2CXot8i6V1HlFiKMxINtZiLihMBMymktQkDAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/aa5EBflci-EMvPh-JLD8CJXUeyA>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jul 2018 21:47:07 -0000

On Tue, Jul 03, 2018 at 08:10:52PM +0000, Mike Jones wrote:
> 
> I believe that the ACE "profile" parameter is typically unnecessary and
> not in the spirit of normal OAuth.  Configuration information between
> OAuth participants is typically configured out of band and/or retrieved
> from the AS Discovery document (per the newly minted RFC
> 8414<https://tools.ietf.org/html/rfc8414>). There's no need to
> dynamically exchange a profile identifier when this is essentially always
> known in advance.  We should not include "profile".  For that matter, ACE

For what it's worth, this part of "the spirit of normal OAuth" is something
that leaves me with lingering unease.  While I do not dispute that this
sort of configuration information is usually known out of band or via
discovery, we ought to be considering the potential consequences when the
parties do not actually agree on what configuration should be in use.  An
explicit indicator makes for an easy-to-analyze "fail quickly" scenario,
whereas leaving things implicit is much harder to reason about.  And yes,
this case of easier analysis is at the cost of complexity elsewhere, so
there is a tradeoff.

-Ben


From nobody Thu Jul  5 08:02:36 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 46FCB130DE5 for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:02:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kUnrY4WzJ0su for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:02:31 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640091.outbound.protection.outlook.com [40.107.64.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAEB6130E84 for <oauth@ietf.org>; Thu,  5 Jul 2018 08:02:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eBhhyf9xdv7SfvytW5d3HIjsU5N1TusxBfAa2BzEkuE=; b=CHSZsEBtasLRGwwRCKQxE5xv5YRazDR3Dd532/Wdbs7l+qFwGK5UtddilPu0cBQc2ka7JnzE0oboxS8rJ0CmwmjtgMMG1LXSnC+S8xvX94ihKmIaXkOtblNYMthP//XErWgzv415b16zpFdNzvdL7JbDqeAT/GpvZxKSwSb2cuY=
Received: from MW2PR00MB0298.namprd00.prod.outlook.com (52.132.148.29) by MW2PR00MB0378.namprd00.prod.outlook.com (52.132.148.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.967.0; Thu, 5 Jul 2018 15:02:29 +0000
Received: from MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37]) by MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37%6]) with mapi id 15.20.0971.000; Thu, 5 Jul 2018 15:02:29 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Ludwig Seitz <ludwig.seitz@ri.se>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] PoP Key Distribution
Thread-Index: AdQTBj47ZlOcOW2pSHSpIBiWadk6FgAA3/bgABXsJYAAQ7FFYA==
Date: Thu, 5 Jul 2018 15:02:29 +0000
Message-ID: <MW2PR00MB0298E13AF13CA7094E22383CF5400@MW2PR00MB0298.namprd00.prod.outlook.com>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com> <67ab6c51-4299-b433-01f0-cd023574175a@ri.se>
In-Reply-To: <67ab6c51-4299-b433-01f0-cd023574175a@ri.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.47.80.188]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR00MB0378; 6:gywdvnl8qmrverDAJp51BuXS8onZhG5M6YYjf/tLlTRWOE/xgAxB8m5050LRmeql2MeZZQiTXf6Mwm7u0ddhqSXhl06aajgE+OX3dT2m+vLwwre+I2lukEUE3ArAWsHBGB0Edb5GKLFk+/s8QVTERFYCY/W+9WhJuzzHLPh51lxRR41tGvwY2WgotECFMqlMdNpxDdbm3Q4/AkuoWEyjlksedvNN2/PLRxGOK0/OV5D3wYqu3+JKsfn2z+1iRVdtwjBl+LG04ihOmFOEvoS9kWHeKudkhsFxoUb9XIYzRvoN9kp4iF9ogOQ+CZp0PiqdogQ9GZTC4hlxYj7LPXP+biM6wc2ejvSN4SS1uulegmRELP/1tyDl2JbmQNN1DwIWNz5ZVW4y8E8HUjz7QyGDS/pSGWvEkeWUKGV3OCCTC0Pta7XnmyzaL2daP08q4iiZq5cmrHcEnpQCVuSeO5cLyQ==; 5:oIFGZuBb9Qt/ITKv/bgwm7zxtc280DYSmG9nnBE0YgoIguIfuCgqrPzMIgq/M5Jm17azHhblVEQgBmJIaV9cseurGEhMpWiwaRgAl2KYXP6pXGyp4e6z7MVUtYShzVt23DYk6Ko0oVOJUjWTdhzJQzF/xToUh4TZ023kNnJXGkA=; 7:p4XpFWbv+K52KhZFeDW2m1aRAULJdo9EgqUCH7XJPqZMwyc0fhJ7xC7uoENwfyoW9EaB6Tm0FTYHhTMcrs+uPGuoXIhuHE2jPgFzBcT+C3SSOGEG1iuzaRm9kof1vEhNuzbKh0GSVgkBKQOip3H6y0ikFfuMPL94Fa9/YYUiGwcfJVY4MtjvnundqBLrcuzmeUPBRA7k+FKJA5WgniqI7Ddb98GU4biR+P5coO/+Uswt+R9Vi5R4ZJrUL5VA7RQw
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 091e92b6-1168-43cc-6cd9-08d5e28853ff
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:MW2PR00MB0378; 
x-ms-traffictypediagnostic: MW2PR00MB0378:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <MW2PR00MB03787608E8FCEC0F4BADE74CF5400@MW2PR00MB0378.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027023009)(20171027022009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3002001)(93006095)(93001095)(3231280)(2018427008)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:MW2PR00MB0378; BCL:0; PCL:0; RULEID:; SRVR:MW2PR00MB0378; 
x-forefront-prvs: 0724FCD4CD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(136003)(346002)(376002)(366004)(199004)(189003)(13464003)(7696005)(186003)(99286004)(53546011)(2900100001)(26005)(6506007)(8676002)(76176011)(6246003)(9686003)(55016002)(5660300001)(6436002)(446003)(486006)(74316002)(7736002)(5250100002)(102836004)(476003)(11346002)(2501003)(316002)(6306002)(86362001)(81166006)(22452003)(86612001)(305945005)(14444005)(110136005)(478600001)(8990500004)(33656002)(25786009)(966005)(2906002)(66066001)(72206003)(81156014)(10090500001)(8936002)(68736007)(14454004)(10290500003)(53936002)(3846002)(106356001)(229853002)(6116002)(105586002)(97736004)(256004); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR00MB0378; H:MW2PR00MB0298.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 0LUsbHWvAh63AiH6mMw8EC/XpA+OfzAgxYQ+qUBjQ1xsJHoeyCmV274Ldk852Ydo07v30nSzA8hQF87MfoXtND3E2+CcKaysNlEeq9uLOQEq06TEtLjeaunH3qxCoNF+lC7lZmeQ6+0BJ3hO8Y3oT+XWw1g6b5kKBHI1xtkKyLXdtfYWurEvLaTW4Pnkxbk3QqIm/bWB1Tz622S5gdc00urkvuevE4Ij0ZOhQnF4rdW5KwaLVymYEBcpXUzGz/YVYBf9vYGunLIcBBss1sr7/YB6VBvkD9X/GVTuD09fEPEATWMok+Q0vzQG6TOgBhvoCJzYPj4eb+EJz/mCmuQK4ak54RamJA4WRbsSigVCcvs=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 091e92b6-1168-43cc-6cd9-08d5e28853ff
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2018 15:02:29.4320 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR00MB0378
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/1_e8AsEvtlYwQ634Y70_rGJVZ3Q>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jul 2018 15:02:35 -0000

Hi Ludwig.  You're right that AS Metadata doesn't cover RS Metadata.  I sta=
nd corrected on that point.  There was once an OAuth Resource Metadata draf=
t but the working group didn't have immediate use cases for it and so it wa=
s allowed to expire.  Work on it can resume, if it would be useful.

I'm glad that "profile" is now optional in ACE.  I still believe that dynam=
ic configurations where clients might use multiple OAuth profiles are a cor=
ner case and that purpose-built clients that have the profile information b=
aked into the code will be the norm (particularly in constrained environmen=
ts).  I'm fine with an independent OAuth specification being created that d=
efines a profile identifier but I believe that conflating this with OAuth P=
oP Key Distribution would be a mistake.

				-- Mike

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org> On Behalf Of Ludwig Seitz
Sent: Tuesday, July 3, 2018 11:37 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] PoP Key Distribution

On 2018-07-03 22:10, Mike Jones wrote:

>=20
> I believe that the ACE "profile" parameter is typically unnecessary=20
> and not in the spirit of normal OAuth.=A0 Configuration information=20
> between OAuth participants is typically configured out of band and/or=20
> retrieved from the AS Discovery document (per the newly minted RFC=20
> 8414 <https://tools.ietf.org/html/rfc8414>). There's no need to=20
> dynamically exchange a profile identifier when this is essentially=20
> always known in advance.=A0 We should not include "profile".=A0 For that=
=20
> matter, ACE should delete it as well, as it certainly isn't=20
> appropriate in constrained environments.
>

I strongly disagree with this statement. First of all let me correct a misc=
onception you seem to have: RFC 8414 is about AS metadata, while "profile" =
is RS metadata, so unless I've overlooked something, RFC 8414 is not applic=
able.
The "profile" parameter tells a client which communication security method =
to use with the RS (e.g. TLS) and how to perform the proof-of-possession of=
 a token towards an RS (e.g. TLS client authentication).
When you take the work on proof-of-possession into account, that feels very=
 much in the spirit of OAuth.

Second: the "profile" parameter is optional, so if it is already known beca=
use it was configured out of band or discovered somehow you just don't send=
 it.

Finally: Profile is intended for use cases were mobile clients and RS dynam=
ically join and leave a network, so that pre-configuring clients with metad=
ata about the RS is difficult. Do you have a better idea how to solve these=
 cases?


/Ludwig

--
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From nobody Thu Jul  5 08:03:30 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B28F0130E7A for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:03:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ziWcoxEE6rKF for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:03:25 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640110.outbound.protection.outlook.com [40.107.64.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE2A1130DED for <oauth@ietf.org>; Thu,  5 Jul 2018 08:03:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=H9hG80EREEmLYOs8JExAu9AzkE+e3XZuOVYlRbSAMOw=; b=Sb8qz7iWbIyT3XsLMVTsmPaldM3y6uMRkhwbhJ3roPYQ5DoGN4np/jcrGuWjPdKQnHdHTmSoWkSw+kXnPiaxVFDHE79gXp4zRQc39sqRh5hGeGhVwuKKUKst4XXnvjlEAgtYurwb/pNcbkKtcnLu1Ha4cCeE0R2VQ3pGzkeeseI=
Received: from MW2PR00MB0298.namprd00.prod.outlook.com (52.132.148.29) by MW2PR00MB0378.namprd00.prod.outlook.com (52.132.148.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.967.0; Thu, 5 Jul 2018 15:03:23 +0000
Received: from MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37]) by MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37%6]) with mapi id 15.20.0971.000; Thu, 5 Jul 2018 15:03:23 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] PoP Key Distribution
Thread-Index: AdQTBj47ZlOcOW2pSHSpIBiWadk6FgAA3/bgADWyZIAAJC4Z4A==
Date: Thu, 5 Jul 2018 15:03:23 +0000
Message-ID: <MW2PR00MB02981EA3C86ED3715B89A188F5400@MW2PR00MB0298.namprd00.prod.outlook.com>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com> <20180704214654.GK60996@kduck.kaduk.org>
In-Reply-To: <20180704214654.GK60996@kduck.kaduk.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.47.80.188]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR00MB0378; 6:YnCAIe783PdZANhlO0dmkXSFo0TLwATVAsNgyRpXcv32PF/t9zVfLkfWmaJojtl+SCEjB/xZyx6EV7QcpVB+rKhp2NC64M6EA4iaK/onS4cPf65QCYzGKXSD3sMIfJWuWbXGkF0pHfH58X8uIMxHvzSYsiWKZ4elp4OLpHnZDVW2JV6Vx/ldyz47ygRgZWqcX6ne8sFeVrGdvePZdyaWRZmlMVMtCPslCIFPsvM5ErRBCxOiuWUr77ptoY2nj5Sbh6HgWWswuklue0DmqQQpURRL9SxMVL8AWk3wMO3HluxZ1BFOkOwkmA3EO8PuRVnCVXmFtzeZzG7hZaiwfQ4QtUjnfqtDT5bZDezUmgtSLNfjJOG+nOE7BsUjeeOMrU2P214qyWuubyIGHqiz+VVCtzPC3R0M/3WLgsCD+PmCcV+4AXQAzcUJER1mKMAnPsaIIrmzntNPkspZRQDipkjMGQ==; 5:Fx0gSSt6BKS+RCYcZ8UuvBS4Annc6Uk8qOuYJIN/Do8EkYvGty3QhP8fooc+g5zgnctQejEVYEIQJF7SZxqraGwW0lG9wE59PZnraNiLQmrhqC9jZp1HuC/qXZKzk131qgjGB2FGQwjW+UMDiFvjMqgTKIfx/EffjOV23t5WGNA=; 7:9rL07k7xmgRW6AtStxqouGleiCHDgIa25hOKN783RSMXWh5yjbJlezWuqDlcpE4rm7cuZAEicCwyzzyTZk9KXpXTeUqWDtRZ9E7NGznH0nOxXPQIAMzokk7sN8Lh5rqKbcfSQtGGMaE1nOHt5PO64iI7pKDu+X+9gKeDXCNrJonK4tPs0e5pEmajZafoTXxU2Ni/9rGnOiqdMV7MNf8wE2VOiOPbO20OO2El9IWrfCKnlgFkq0qPThraZ7L0y/4Z
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: f7f8da45-e445-42ef-7e13-08d5e2887417
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:MW2PR00MB0378; 
x-ms-traffictypediagnostic: MW2PR00MB0378:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <MW2PR00MB0378B64FD32DED27A0B5A1E6F5400@MW2PR00MB0378.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(240460790083961); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027023009)(20171027022009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3002001)(93006095)(93001095)(3231280)(2018427008)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:MW2PR00MB0378; BCL:0; PCL:0; RULEID:; SRVR:MW2PR00MB0378; 
x-forefront-prvs: 0724FCD4CD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(136003)(346002)(376002)(366004)(199004)(189003)(13464003)(7696005)(186003)(99286004)(53546011)(2900100001)(26005)(6506007)(8676002)(6916009)(76176011)(6246003)(9686003)(55016002)(5660300001)(6436002)(2171002)(4326008)(446003)(486006)(74316002)(7736002)(5250100002)(102836004)(476003)(11346002)(316002)(6306002)(86362001)(81166006)(22452003)(86612001)(305945005)(478600001)(8990500004)(33656002)(25786009)(2906002)(66066001)(72206003)(81156014)(10090500001)(8936002)(68736007)(14454004)(10290500003)(53936002)(3846002)(106356001)(229853002)(6116002)(105586002)(97736004)(256004); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR00MB0378; H:MW2PR00MB0298.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: qetFb31uIPfQ2XgP9g5nHZJ5ZLrqzXjc9s/XLsmMkcnAvzAncBwmzAvOe3jvWbtrcQfD7/1ib2HcnW1sqALTjR0i9D9a/hMzYi2ejt/atH56+ee/Fq+WkvDw5PiWhRPdCzajoUJq7FDRJX6CwMEQCEzieIDFghsXMWn3K4S8OtlCcuzi/fbBTnMc6tNalhLJ3UQoc5oRtyEenlkJGWfl0Fg1e248g5x/QINlQs2j6QJc3AFoKbpWDOCnj44+azTBb/+d248zOf1A6Q94tot++DDB0paS5reFQ+7cdbEywCTlNaJnSqZ973B5urgzCog49Z2Xu39T9NbHRz8dtrqa8biIAtqAWG70rLAhP/RZ2JM=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f7f8da45-e445-42ef-7e13-08d5e2887417
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2018 15:03:23.3078 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR00MB0378
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/H-aGIPC3c1U8idbcipJDQxvXLt4>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jul 2018 15:03:28 -0000

[See my reply to Ludwig, since the thread forked]

-----Original Message-----
From: Benjamin Kaduk <kaduk@mit.edu>=20
Sent: Wednesday, July 4, 2018 2:47 PM
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] PoP Key Distribution

On Tue, Jul 03, 2018 at 08:10:52PM +0000, Mike Jones wrote:
>=20
> I believe that the ACE "profile" parameter is typically unnecessary=20
> and not in the spirit of normal OAuth.  Configuration information=20
> between OAuth participants is typically configured out of band and/or=20
> retrieved from the AS Discovery document (per the newly minted RFC=20
> 8414<https://tools.ietf.org/html/rfc8414>). There's no need to=20
> dynamically exchange a profile identifier when this is essentially=20
> always known in advance.  We should not include "profile".  For that=20
> matter, ACE

For what it's worth, this part of "the spirit of normal OAuth" is something=
 that leaves me with lingering unease.  While I do not dispute that this so=
rt of configuration information is usually known out of band or via discove=
ry, we ought to be considering the potential consequences when the parties =
do not actually agree on what configuration should be in use.  An explicit =
indicator makes for an easy-to-analyze "fail quickly" scenario, whereas lea=
ving things implicit is much harder to reason about.  And yes, this case of=
 easier analysis is at the cost of complexity elsewhere, so there is a trad=
eoff.

-Ben


From nobody Thu Jul  5 08:04:50 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7847B130E7A for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:04:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TPaIGcvrgBsK for <oauth@ietfa.amsl.com>; Thu,  5 Jul 2018 08:04:46 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640134.outbound.protection.outlook.com [40.107.64.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE590130DED for <oauth@ietf.org>; Thu,  5 Jul 2018 08:04:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NFVVSHKOFE1qvRfsqcgSbiX6PCO5pvXvHq1GqlPGogQ=; b=M6uIfc/5xXZ73NrK5+COd+ynJ5HwvLRBjuK4LJOB5uWKOZy4+zGRZuzAbTBVdEP+rVArB2/f6rktZRnHgVO1xplg3wokKVcO3k14C7UIELnquW9qqJJeLzxJzbkitf8z0O5zP8EHmtYcTdWnEOD5NWaVgzW22QeWEyhrxT61Erc=
Received: from MW2PR00MB0298.namprd00.prod.outlook.com (52.132.148.29) by MW2PR00MB0428.namprd00.prod.outlook.com (52.132.149.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.967.0; Thu, 5 Jul 2018 15:04:35 +0000
Received: from MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37]) by MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::9c24:5ebc:cf1a:dc37%6]) with mapi id 15.20.0971.000; Thu, 5 Jul 2018 15:04:35 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Ludwig Seitz <ludwig.seitz@ri.se>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] PoP Key Distribution
Thread-Index: AdQTBj47ZlOcOW2pSHSpIBiWadk6FgAXco4AAENT58A=
Date: Thu, 5 Jul 2018 15:04:35 +0000
Message-ID: <MW2PR00MB0298594ADC1B2904CC48D881F5400@MW2PR00MB0298.namprd00.prod.outlook.com>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <58eac9f9-21a6-aa6d-ac28-6fce70cfa08e@ri.se>
In-Reply-To: <58eac9f9-21a6-aa6d-ac28-6fce70cfa08e@ri.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.47.80.188]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR00MB0428; 6:KZ6RNvpMdid6aLrofjX4sceKhMh2gfGZUkpi4YMUM9oSbtFTPhC1vb7zzGHrBZRBmvKmjKMQIGOZ94XK7ALbEUVsbSllg7+TH3mflaVCtECnou2lmaiBEOHlQgLprgJUAKWqy3Z9vHTWvTaAQfDZSHXG2X/DACrt6BR6W1OIKGBGmQTM+PfYF8kHswFrBKDMg8jz7MVOJQPzxIkOaorzzuav0qberJOpg55llq/i+37+aCcEf6GNzks+1Io3zxhjKtThmEvW+WTNy4LLGtYyUP+Td954zHZzxBkeSNtp3NhVHiQFSM/rGpukTZUEyJLKSJOYrc65EuLIIzPz7x/28CFXb4h/lgsEi/QEaaDkFRlEIN1535ZyWTWejvIvmr3aoAw+rjYSEsDaLFP8AOINvrj+BrQ75YlXQRXL/7tigdAeXrRq7TDvzGAzqft4zyVS7KzejmA6Dq3AvmMU8xKQwg==; 5:LByWBUaduLl4H+AWByA6KKppmjYe9Jy3k1DLa7FDRtqFXcTfo/rYVaF+d1WMoiYHBqxtFtjSgSyXwAz1kpGPZ/5X+pboCto6wcZgqis24ggnVTwTm3XOznMtS3kDxgvRHVZb+4xPA13iU93F7/N3LbtC7WJKziWwf/TCozNV3WE=; 7:F2nAVuYVfdvTWWVFBBObpnGU7NajCDyGBNMesASygxIoE0sKerrEAdCwPMj02Q3+PJzBCq6+7lr71Ynrq29d0JFYZu20MU6iAHSXtygaGYCXun2C/51Vk9MU/cB2sBupzHnmgzSQeJmneVH7w1Crn8Cu3sbxciFCmJFE+6P11R6AYn5Y8Kbfh9nko/CPyU6YDzRLHrryz0FRLJlVZmMRBHbOlb37DjWTLPSCAF6X4hWCl9VYxI0OiwkIr+ZZVcUG
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: e9dd39b7-9036-4b88-ca47-08d5e2889f22
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:MW2PR00MB0428; 
x-ms-traffictypediagnostic: MW2PR00MB0428:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <MW2PR00MB04287B338B4A1A9CD8A8240AF5400@MW2PR00MB0428.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(192374486261705);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(93006095)(93001095)(3002001)(10201501046)(3231280)(2018427008)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:MW2PR00MB0428; BCL:0; PCL:0; RULEID:; SRVR:MW2PR00MB0428; 
x-forefront-prvs: 0724FCD4CD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(136003)(396003)(39860400002)(376002)(366004)(53754006)(199004)(189003)(13464003)(186003)(99286004)(5660300001)(53546011)(2900100001)(53936002)(7696005)(26005)(8676002)(76176011)(6506007)(6246003)(6436002)(6306002)(55016002)(9686003)(5250100002)(486006)(11346002)(74316002)(446003)(102836004)(7736002)(476003)(110136005)(316002)(86362001)(8936002)(81166006)(256004)(305945005)(14444005)(2501003)(81156014)(33656002)(8990500004)(478600001)(25786009)(86612001)(966005)(14454004)(22452003)(10090500001)(68736007)(2906002)(72206003)(10290500003)(6116002)(3846002)(229853002)(97736004)(105586002)(106356001)(66066001); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR00MB0428; H:MW2PR00MB0298.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: IOj9yqRBB9I82dZsL1BOgtWbgsVsu9nV9mAlbsrbzcI/G7DPjwuyz5pauS8BgMYqi0PWQ7/FdRHmsvZ22jC/k91Jnrb9vWIzUybm8XPdQ6xc7K1yg+Q6V+8n6Q3VJEZE29Do9X3Ejv2wyl/Hjm5RzbGS6xd9pZkPjF2Vvj9yobhdynMXcxcyFacmcVSiaXdXTbF1xX7gpIsQhzwJqp+yqwWvR1vT5oNTcIXf7xEbNOurgwiusWAGhLMylSYHIymU+UmyGT9ps7P65/kH891Ljy9YGwSTnD5D3gBAREF0iq0PGuYa6hUnWPHOOP5UQOibKBjkOQIsEOMsWyeCNM3UE6jGy1jTO20khrTwYIcb1mE=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e9dd39b7-9036-4b88-ca47-08d5e2889f22
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2018 15:04:35.5319 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR00MB0428
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/IY9tRd7wfDfrp9_wUQJtzeLz86A>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jul 2018 15:04:49 -0000

I'm fine putting some bandwidth into finishing OAuth PoP Key Distribution -=
 particularly now that OAuth AS Metadata is finally done.  I know that Hann=
es is willing to do so as well.

				-- Mike

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org> On Behalf Of Ludwig Seitz
Sent: Tuesday, July 3, 2018 11:56 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] PoP Key Distribution

On 2018-07-03 21:46, Hannes Tschofenig wrote:
> Hi all,
>=20
....
> Where should the parameters needed for PoP key distribution should be=20
> defined? Currently, they are defined in two places -- in
> https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13 and also in=20
> https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03.=20
> In particular, the audience and the token_type parameters are defined=20
> in both specs.
>=20
> IMHO it appears that OAuth would be the best place to define the=20
> HTTP-based parameters. ACE could define the IoT-based protocols, such=20
> as CoAP, MQTT, and alike. Of course, this is subject for discussion,=20
> particularly if there is no interest in doing so in the OAuth working=20
> group.
>=20

I fully agree that OAuth would be the best place. I've only drawn some of t=
hese parameters into draft-ietf-ace-oauth-authz because the work on draft-i=
etf-oauth-pop-key-distribution seemed to have been discontinued (it expired=
 August 2017).
That said, I'd hate to introduce a normative dependency into draft-ietf-ace=
-oauth-authz on a document that will not move forward or only move very slo=
wly. What are the prospects of going forward quickly with draft-ietf-oauth-=
pop-key-distribution?

> There is also a misalignment in terms of the content..=20
> draft-ietf-oauth-pop-key-distribution defined an 'alg' parameter,=20
> which does not exist in the draft-ietf-ace-oauth-authz document. The=20
> draft-ietf-ace-oauth-authz document does, however, have a profile=20
> parameter, which does not exist in=20
> draft-ietf-oauth-pop-key-distribution. Some alignment is therefore=20
> needed. In the meanwhile the work on OAuth meta has been finalized and

It seems indeed that 'alg' and 'profile' parameters have some overlap, alth=
ough 'alg' seemed a bit more narrow to me (which is why I created 'profile'=
).  If we could extend the definition of 'alg' a bit, I'd be OK to remove '=
profile' from the ACE draft (provided the OAuth draft moves forward in a ti=
mely manner).


/Ludwig

--
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From nobody Mon Jul  9 07:42:06 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96E5B131008 for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 07:41:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XzWajoNZ_FCs for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 07:41:55 -0700 (PDT)
Received: from mail-ua0-x22a.google.com (mail-ua0-x22a.google.com [IPv6:2607:f8b0:400c:c08::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36456130FFC for <oauth@ietf.org>; Mon,  9 Jul 2018 07:41:55 -0700 (PDT)
Received: by mail-ua0-x22a.google.com with SMTP id q12-v6so11866186ual.2 for <oauth@ietf.org>; Mon, 09 Jul 2018 07:41:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=3ow5RlOr2Uf6KBAr8Q5ohtOqNnB2ie6FXaLKmCtJWCo=; b=ZrAPAWmgX0/B8A+yXhLwYFxrTu/hHgm9QABsvkWwVHGdTE5SUSvyX0JRHHTV12FCEf NZ3JBagKOKyQuTPtXBJRk1Qic+0br459CSOzzB5L5mgGmeXGsDStvRtIpFHVqP4gwmdi jNuSJ5YG1ti2nS8pRyUzgZG/baeqBHU5UFrbDhU0OR/aRMRRtfV/IdaSGleCyaraFQeh r1bUHIlI/M4fjxhQSsdDxCTaUQCX1m3YzUhwCoQDeseUstaYH8rChDFEtcG1+K9bTFpH O1bBTjnvTV4iP3qi+zG9mt/XEJZCzsMjA6DtvRWOP012u3EmtJv3jAtjPObePw+dtrGU vmIA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=3ow5RlOr2Uf6KBAr8Q5ohtOqNnB2ie6FXaLKmCtJWCo=; b=NQ5cQVcpRfE1cqAzgdTuNGjwBMla1yxSHfQHBlkhOUESjhIikufoyeafckNjncG8NI DGOeilokfY5q0mTE7GZhez8rZaj6mq3VKAjXXO6BlZw4YLenoHUzRaxrTnzj/4b1ZHn2 5pj8E0dX0/IKrS0dD7NSCaNPl2OlJQ8kKfPJCY1KK12lH/4rc6aPaDNcbaZbcCddBKAt IHOxHbQSw2KZ8y1r1b7uKUok99xOZNWk3GuxvGNACcKZV7/e28K1jEuVN7oXId8yJbog Rq6ZPKVX+2gCUrjtTTUBtubYsWFmVeK4Gk0QhnWOp8KCd3FpSgLnvz3Mzcd6XNYKZ5/j ko4A==
X-Gm-Message-State: APt69E0fWFytT5tskkB/CoPhAhtqWVAQcvz0hK+Ip8mmUnvSARH7yiJ1 dAlpSTt0WCyxstMGGNbAwMS2CmjIt0zgzOwjlzavQRNw
X-Google-Smtp-Source: AAOMgpcukXMfQD+pRxJ03Aok1XDiFOvLL3wImqONETUZmzytW9b4OwC03yFPsXsY4gQmW71m9E398Z6xLfdD3Nb9ujU=
X-Received: by 2002:ab0:4853:: with SMTP id c19-v6mr12932779uad.157.1531147313853;  Mon, 09 Jul 2018 07:41:53 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Mon, 9 Jul 2018 10:42:23 -0400
Message-ID: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000bdb6c30570920314"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/tiwq48JneM_ucAw2IrPZaUtSjmo>
Subject: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2018 14:42:03 -0000

--000000000000bdb6c30570920314
Content-Type: text/plain; charset="UTF-8"

The following is a draft agenda for next week.
Please, let us know if you have any comments.

Regards,
 Rifaat & Hannes


Web Authorization Protocol Meeting
----------------------------------

** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization (30 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/

* Reciprocal OAuth (30 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/

* OAuth 2.0 Token Binding (15 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/



** 9:30-11:00     *Thursday *Morning session I ** (90 min)

* PoP Tokens (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
Distribution
  https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08

* Distributed OAuth (30 min)
  https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/

--000000000000bdb6c30570920314
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><font face=3D"monospace, monospace">The following is a dra=
ft agenda for next week.</font><div><font face=3D"monospace, monospace">Ple=
ase, let us know if you have any comments.</font></div><div><font face=3D"m=
onospace, monospace"><br></font></div><div><font face=3D"monospace, monospa=
ce">Regards,</font></div><div><font face=3D"monospace, monospace">=C2=A0Rif=
aat &amp; Hannes</font></div><div><font face=3D"monospace, monospace"><br><=
/font><div><font face=3D"monospace, monospace"><br></font><div><font face=
=3D"monospace, monospace"><div>Web Authorization Protocol Meeting</div><div=
>----------------------------------</div><div><br></div><div>** 15:50-17:20=
=C2=A0 =C2=A0<b>Tuesday </b>Afternoon session II ** (90 minutes)</div><div>=
<br></div><div>* Chairs Update (15 min)</div><div><br></div><div>* OAuth 2.=
0 Incremental Authorization (30 min)</div><div>=C2=A0 <a href=3D"https://da=
tatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/">https://datatra=
cker.ietf.org/doc/draft-ietf-oauth-incremental-authz/</a></div><div><br></d=
iv><div>* Reciprocal OAuth (30 min)</div><div>=C2=A0 <a href=3D"https://dat=
atracker.ietf.org/doc/draft-ietf-oauth-reciprocal/">https://datatracker.iet=
f.org/doc/draft-ietf-oauth-reciprocal/</a></div><div><br></div><div>* OAuth=
 2.0 Token Binding (15 min)</div><div>=C2=A0 <a href=3D"https://datatracker=
.ietf.org/doc/draft-ietf-oauth-token-binding/">https://datatracker.ietf.org=
/doc/draft-ietf-oauth-token-binding/</a></div><div><br></div><div><br></div=
><div><br></div><div>** 9:30-11:00=C2=A0 =C2=A0 =C2=A0<b>Thursday </b>Morni=
ng session I ** (90 min)</div><div><br></div><div>* PoP Tokens (60 min)</di=
v><div>=C2=A0 OAuth 2.0 Proof-of-Possession: Authorization Server to Client=
 Key Distribution</div><div>=C2=A0 <a href=3D"https://tools.ietf.org/html/d=
raft-ietf-oauth-pop-key-distribution-03">https://tools.ietf.org/html/draft-=
ietf-oauth-pop-key-distribution-03</a></div><div><br></div><div>=C2=A0 OAut=
h 2.0 Proof-of-Possession (PoP) Security Architecture</div><div>=C2=A0 <a h=
ref=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08">ht=
tps://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08</a></div><di=
v><br></div><div>* Distributed OAuth (30 min)</div><div>=C2=A0 <a href=3D"h=
ttps://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/">https://dat=
atracker.ietf.org/doc/draft-hardt-oauth-distributed/</a></div><div><br></di=
v></font></div></div></div></div>

--000000000000bdb6c30570920314--


From nobody Mon Jul  9 12:33:53 2018
Return-Path: <farezeysz@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA528130E35 for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 12:33:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level: 
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_OBFUSCATE_20_30=1.999, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, TVD_SPACE_RATIO=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4TjyY8nPRbyt for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 12:33:51 -0700 (PDT)
Received: from mail-pf0-x229.google.com (mail-pf0-x229.google.com [IPv6:2607:f8b0:400e:c00::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BAD812785F for <oauth@ietf.org>; Mon,  9 Jul 2018 12:33:51 -0700 (PDT)
Received: by mail-pf0-x229.google.com with SMTP id s21-v6so14368765pfm.6 for <oauth@ietf.org>; Mon, 09 Jul 2018 12:33:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=date:from:to:message-id:subject:mime-version; bh=hxj1gdZsYkuvhEZnLWYFhxa+WDDi8RjIVuavxiNwgSQ=; b=YGorQVk/b68NRLI9o3WRqhndj8h+8KKc03Uo3wDo7HqQvzUoOy+XelhHV6pIIX/brR olx3V9eQd4hEMorcBA70qrcNEpqlbwSWZw3jrOMq4KimBC1HS6NXVTp1fWRrZsahXGg/ Tlg4eD5HBQ9QVS0OlO/0ZOLcbgJDOO9Sk3sWTCpzCDRS+S+uP0OeDT6xvSIDDYORRQA+ KunoVmcyTvDM9/f+bAshLLkq+diTp0hzIwCPWENwjkUKiE65aHQGq7hxdWoiib9jo7z+ gOPQIaw6zpm0x/JL/KouG0kdXyrZ0j9YSqkQ8QUH2yUxKDcJp8uYKdZ6s3//iJ7JLObv /o3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:message-id:subject:mime-version; bh=hxj1gdZsYkuvhEZnLWYFhxa+WDDi8RjIVuavxiNwgSQ=; b=If7pXGC4zjnhqTwdoV7J6sKPPLiAl3QcvJRZ0ePFXS7Vm/VQqT6SuDZ2kePG9BME5B AwRYmgoAPDbmYSiV19r6iEdyC6Avklp19s5BFF74rTlhtfO2fSBClY6VDoftlpmzO5FP TQejJc+jg90LFX+O39SDx63NlGDI1kF94cCYV4jvj9luQ/TrpOjqEVyBYmVJBOI8v4sv ilZgdJ0a5VUhHnobdlxzBHwKWW79yibX5M/JW9L4MW3DSJ1GPoFK3H5OKavP5apFjiUH yyVM4xj7zQjHuXLxqDCFF6K/yRDxoH9oVDX4r344ZLhClGh0zws6OiWHaUF0QZ43H99O pwtA==
X-Gm-Message-State: APt69E1KglAjmCH3E8MV4wMMYjiTqdsUro8t7eprKa+LNCgWvgpt6/EA cSpCdpEBI3ZXY51Dv4EGIvmH5Wjq
X-Google-Smtp-Source: AAOMgpclmPUr4/4FyojkHnsgdHc7wt0+2WjGQRWPCGIuByHfI4NIBKkVzFrGdsPieaDj4dpLs9v1bQ==
X-Received: by 2002:a63:e0b:: with SMTP id d11-v6mr20229112pgl.134.1531164829934;  Mon, 09 Jul 2018 12:33:49 -0700 (PDT)
Received: from [2404:160:8020:45a7:d0a5:bf0d:100::] ([2404:160:8020:45a7:a93e:441a:92d1:3d96]) by smtp.gmail.com with ESMTPSA id m9-v6sm22407375pge.25.2018.07.09.12.33.47 for <oauth@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 09 Jul 2018 12:33:48 -0700 (PDT)
Date: Tue, 10 Jul 2018 03:33:46 +0800
From: Eysz 7Words <farezeysz@gmail.com>
To: Oauth <oauth@ietf.org>
Message-ID: <b8236972-3137-4aad-86a2-73f0ef494c48@iPhone>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5b43b89a_6b8b4567_e2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/xkGesmLmBmtwCyexMn_Dy4QJWh8>
Subject: [OAUTH-WG] eysz@ietf.org
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2018 19:33:52 -0000

--5b43b89a_6b8b4567_e2
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

     
 

 
 
 
 
 
kofutzueexoycyij
 
 
 
 

 
     
--5b43b89a_6b8b4567_e2
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<html><body><div id=3D=22edo-message=22><div></div><br></div><div id=3D=22=
edo-meta=22><style>=23edo-signature img =7Bmax-width: 90%=7D</style><div =
id=3D=22edo-signature=22 style=3D=22font-family: sans-serif, 'Helvetica N=
eue', Helvetica, Arial;font:'-apple-system-body';=22><br><div style=3D=22=
text-align: start;=22><span style=3D=22background-color: rgba(255, 255, 2=
55, 0);=22><span class=3D=22=22 style=3D=22text-align: center;=22>k</span=
><span class=3D=22=22 style=3D=22text-align: center;=22>o</span><span cla=
ss=3D=22=22 style=3D=22text-align: center;=22>f</span><span class=3D=22pa=
rt=22 style=3D=22padding-right: 12px; text-align: center;=22>u</span><spa=
n class=3D=22=22 style=3D=22text-align: center;=22>t</span><span class=3D=
=22=22 style=3D=22text-align: center;=22>z</span><span class=3D=22=22 sty=
le=3D=22text-align: center;=22>u</span><span class=3D=22part=22 style=3D=22=
padding-right: 12px; text-align: center;=22>e</span><span class=3D=22=22 =
style=3D=22text-align: center;=22>e</span><span class=3D=22=22 style=3D=22=
text-align: center;=22>x</span><span class=3D=22=22 style=3D=22text-align=
: center;=22>o</span><span class=3D=22part=22 style=3D=22padding-right: 1=
2px; text-align: center;=22>y</span><span class=3D=22=22 style=3D=22text-=
align: center;=22>c</span><span class=3D=22=22 style=3D=22text-align: cen=
ter;=22>y</span><span class=3D=22=22 style=3D=22text-align: center;=22>i<=
/span><span class=3D=22part=22 style=3D=22padding-right: 12px; text-align=
: center;=22>j</span></span></div></div></div><div id=3D=22edo-original=22=
><div></div></div></body></html>
--5b43b89a_6b8b4567_e2--


From nobody Mon Jul  9 21:49:05 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3417130EF7 for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 21:49:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UKr217pegWNV for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 21:49:01 -0700 (PDT)
Received: from mail-pg1-x52a.google.com (mail-pg1-x52a.google.com [IPv6:2607:f8b0:4864:20::52a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E802C130DDB for <oauth@ietf.org>; Mon,  9 Jul 2018 21:49:00 -0700 (PDT)
Received: by mail-pg1-x52a.google.com with SMTP id r1-v6so1730313pgp.11 for <oauth@ietf.org>; Mon, 09 Jul 2018 21:49:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=CJBBy5qE/XFtoYbZde+33Xe9WtT3C4K/jakMAmiDdN0=; b=FkBNBIeqpnZzggnlbROEoS7D8UUZqgmJCjqZqKD15zeJXCm2KtvKWH1QzPlt3Soslg O4PbZBZ+334a0jTeD+ifM/F2zw1RIGxGpE3Q4Wf0V+W3d/r0zoIjTvBgbRMnIj35j+J5 pOCv/+GBVcQ3019WLNoX4b3YOpMVHaSkVST2xHrcNvSFzRqbe2j2snP0pRvTzISrUjyQ nLSiIXu+7TVl+JIXczeg7CZbE0F12kWa6RAe3k3kxnuQr2KKP1rYkQI5jdEUPsp67ml4 H8arCi+2DMw90QFvuG036NIRKsmGCcE9d2jEB1qxQR9DpWI/Rc4mcTkfRdKEX83iwhx2 lusA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=CJBBy5qE/XFtoYbZde+33Xe9WtT3C4K/jakMAmiDdN0=; b=qDyNnAWuDDQZ0KW6gZkQNSCVxId32CqHyyNrbCOQBsl/lopRL0xqSQXPBV8Viqtojt tFNe24bPI3rnDll1xt7egwm7uwHFSvPgqc6ZnWxfTDzDN7m5KTBuFUfpRYNDgfe5uvcF SuepPB3cv1+HS1YWgdaXpdaTdEWZwDypadXPwfyvV74HkiW19G9BeI1ADBoyxdFxcXVi Hh4Vja1LMlFkGGJm1u49S14999Rci545pq67zStgkCTwifFS+l6V15T6Y7hStD1Nmr65 dnVZiIcmlNFuMgiMncF1WhGWZSMEQeFHEMJ5iPxfCuUXGkHJuwmJ0QwFnIMXY1+oD5D6 MLug==
X-Gm-Message-State: APt69E1/sfU0rdj6TMCmscekmAvAwiOimgMHoTWpYYo9dZtI9x1cq8fI NzcQutQ8PAPKCmLJum8hCJ0gFAMf+oV+OYD6iU0=
X-Google-Smtp-Source: AAOMgpcXejETjb69MtzTxMzj3cu77/EOmN9NBYD4xc7Dpnysg0riVXd/1Hh5+2YzvDa2AmAClFaUb0mj73KQTjTReD0=
X-Received: by 2002:a62:bd03:: with SMTP id a3-v6mr23893417pff.138.1531198140353;  Mon, 09 Jul 2018 21:49:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:8901:0:0:0:0 with HTTP; Mon, 9 Jul 2018 21:48:39 -0700 (PDT)
In-Reply-To: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com>
References: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 9 Jul 2018 21:48:39 -0700
Message-ID: <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000003c92c005709dd968"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/sdaun7532_vZjWrYh6W9vXEw9_M>
Subject: Re: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 04:49:03 -0000

--0000000000003c92c005709dd968
Content-Type: text/plain; charset="UTF-8"

Besides being the oddness that session I happens after session II ... looks
ok!


On Mon, Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> The following is a draft agenda for next week.
> Please, let us know if you have any comments.
>
> Regards,
>  Rifaat & Hannes
>
>
> Web Authorization Protocol Meeting
> ----------------------------------
>
> ** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)
>
> * Chairs Update (15 min)
>
> * OAuth 2.0 Incremental Authorization (30 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>
> * Reciprocal OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>
> * OAuth 2.0 Token Binding (15 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
> <https://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/>
>
>
>
> ** 9:30-11:00     *Thursday *Morning session I ** (90 min)
>
> * PoP Tokens (60 min)
>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
> Distribution
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>
>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>
> * Distributed OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--0000000000003c92c005709dd968
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><font face=3D"monospace, monospace">Besides being the oddn=
ess that session I happens after session II ... looks ok!</font><div><br></=
div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon,=
 Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=
=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</=
a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><fo=
nt face=3D"monospace, monospace">The following is a draft agenda for next w=
eek.</font><div><font face=3D"monospace, monospace">Please, let us know if =
you have any comments.</font></div><div><font face=3D"monospace, monospace"=
><br></font></div><div><font face=3D"monospace, monospace">Regards,</font><=
/div><div><font face=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</fo=
nt></div><div><font face=3D"monospace, monospace"><br></font><div><font fac=
e=3D"monospace, monospace"><br></font><div><font face=3D"monospace, monospa=
ce"><div>Web Authorization Protocol Meeting</div><div>---------------------=
---------<wbr>----</div><div><br></div><div>** 15:50-17:20=C2=A0 =C2=A0<b>T=
uesday </b>Afternoon session II ** (90 minutes)</div><div><br></div><div>* =
Chairs Update (15 min)</div><div><br></div><div>* OAuth 2.0 Incremental Aut=
horization (30 min)</div><div>=C2=A0 <a href=3D"https://datatracker.ietf.or=
g/doc/draft-ietf-oauth-incremental-authz/" target=3D"_blank">https://datatr=
acker.ietf.org/<wbr>doc/draft-ietf-oauth-<wbr>incremental-authz/</a></div><=
div><br></div><div>* Reciprocal OAuth (30 min)</div><div>=C2=A0 <a href=3D"=
https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/" target=3D"_b=
lank">https://datatracker.ietf.org/<wbr>doc/draft-ietf-oauth-<wbr>reciproca=
l/</a></div><div><br></div><div>* OAuth 2.0 Token Binding (15 min)</div><di=
v>=C2=A0 <a href=3D"https://datatracker..ietf.org/doc/draft-ietf-oauth-toke=
n-binding/" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-i=
etf-oauth-token-<wbr>binding/</a></div><div><br></div><div><br></div><div><=
br></div><div>** 9:30-11:00=C2=A0 =C2=A0 =C2=A0<b>Thursday </b>Morning sess=
ion I ** (90 min)</div><div><br></div><div>* PoP Tokens (60 min)</div><div>=
=C2=A0 OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Di=
stribution</div><div>=C2=A0 <a href=3D"https://tools.ietf.org/html/draft-ie=
tf-oauth-pop-key-distribution-03" target=3D"_blank">https://tools.ietf.org/=
html/<wbr>draft-ietf-oauth-pop-key-<wbr>distribution-03</a></div><div><br><=
/div><div>=C2=A0 OAuth 2.0 Proof-of-Possession (PoP) Security Architecture<=
/div><div>=C2=A0 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-po=
p-architecture-08" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft=
-ietf-oauth-pop-<wbr>architecture-08</a></div><div><br></div><div>* Distrib=
uted OAuth (30 min)</div><div>=C2=A0 <a href=3D"https://datatracker.ietf.or=
g/doc/draft-hardt-oauth-distributed/" target=3D"_blank">https://datatracker=
.ietf.org/<wbr>doc/draft-hardt-oauth-<wbr>distributed/</a></div><div><br></=
div></font></div></div></div></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--0000000000003c92c005709dd968--


From nobody Mon Jul  9 22:44:35 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE8F2130E0E for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 22:44:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.509
X-Spam-Level: 
X-Spam-Status: No, score=-17.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dgflaYALdZ7t for <oauth@ietfa.amsl.com>; Mon,  9 Jul 2018 22:44:31 -0700 (PDT)
Received: from mail-ua0-x235.google.com (mail-ua0-x235.google.com [IPv6:2607:f8b0:400c:c08::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43A44129C6B for <oauth@ietf.org>; Mon,  9 Jul 2018 22:44:31 -0700 (PDT)
Received: by mail-ua0-x235.google.com with SMTP id k25-v6so4282549uao.11 for <oauth@ietf.org>; Mon, 09 Jul 2018 22:44:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=2kTjvDCtT1VV+NwYrxmTY9OYlwJmedFNQD+QOMm/xPY=; b=QQ1B+JsA25hu5mQBR3vdU7OP9u7NQnL30pV7Ddr9EKnQeU4Y9ayfr4+zDzNOJ8IC2m RhcVcjKU+q92YNVKOdEja0FpKFH5uicIHpLX1wGqrBSor/KUNkSwde4w2xEjnOU1bDEz 03CAm8sVDyjra3Ofi53AVeLWk+/GzJM1v5zmiLOPhvEC4VpH6KwwGwHgWr/ViNY6vgJP 5bXC7V4EZs+lgQLnPF+4chE9ovEgDZxhJuTIpNRUsPLlg1astDuaDw7vm1BeRtXEfr8m O59oBfWVB6XBb0d//IO2QDDsZ5av8pkNgFsKCbXq+juM/tPuKuPHjVKLxlpA1+QajIW3 5YFA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=2kTjvDCtT1VV+NwYrxmTY9OYlwJmedFNQD+QOMm/xPY=; b=mGaUfwBtNpGVaIC+EIS+otCL2a9AEo4tK9WKX+M04sot5jNI+5V9tTHce4uw9VJ5GL AjS8JNMje1I/9snznDB6gzlaGvPelR5Q8lwd1qTt0kHzPCupI9fU7P0UkvdeL8sG/Sr3 2HWaJ6yRGtYhQmR5GzZYqz/aQPlWZha1rFJDgn1R2CVvKemIzJN12q2A4Yqv4ld3W98f ZlUc/3Ya8F6wvfhYhtZejvb//nITMdM/0HhJTaCM/EvmaTSrdjOxUGX18sH5HPVrXUKc CPKOlH4/mOMcalDF+K9nuh+/ie2NEEJTXej/I95a4E0CaTKdNi8p99R4Cxxb5MFxdYjw 2Hrg==
X-Gm-Message-State: APt69E0txg01zRtDqSu0OF9jgEAZNm1BatlxYMmkcwHoGqXidrDxI9sN PCMgMn4HRqpASZFwlXz8uXZyTTeCIrdKbE5gHgORHQ==
X-Google-Smtp-Source: AAOMgpe+dtN7rFNHPbjutxpX5snrAwuc1TxLwk5UobLCx6J84dcenPLT5ssK6W1a+ThVaE0Z/rIzV6xWmBsJTMjqbJI=
X-Received: by 2002:ab0:130a:: with SMTP id g10-v6mr13537080uae.175.1531201469676;  Mon, 09 Jul 2018 22:44:29 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Mon, 9 Jul 2018 22:44:09 -0700 (PDT)
In-Reply-To: <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com>
References: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com> <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com>
From: William Denniss <wdenniss@google.com>
Date: Mon, 9 Jul 2018 22:44:09 -0700
Message-ID: <CAAP42hDvVFY6v=Gq=S0V=m8f1SwbxDXNd-J1h6Z-7ivamvts1Q@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ae6b3105709e9fe2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/zqOH91o_0q2gXskl7EX80xICoAo>
Subject: Re: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 05:44:34 -0000

--000000000000ae6b3105709e9fe2
Content-Type: text/plain; charset="UTF-8"

Is it OK to me to present Incremental OAuth remotely? I'm not able to
travel for this IETF, but am registered as a remote participant.  I think
20min might be enough to cover that draft timing wise, unless there is a
lot of discussion.

Looks good overall, and I appreciate being scheduled in the afternoon
session on account of the timezone difference.





On Mon, Jul 9, 2018 at 9:48 PM, Dick Hardt <dick.hardt@gmail.com> wrote:

> Besides being the oddness that session I happens after session II ...
> looks ok!
>
>
> On Mon, Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
>> The following is a draft agenda for next week.
>> Please, let us know if you have any comments.
>>
>> Regards,
>>  Rifaat & Hannes
>>
>>
>> Web Authorization Protocol Meeting
>> ----------------------------------
>>
>> ** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)
>>
>> * Chairs Update (15 min)
>>
>> * OAuth 2.0 Incremental Authorization (30 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>>
>> * Reciprocal OAuth (30 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>>
>> * OAuth 2.0 Token Binding (15 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>> <https://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/>
>>
>>
>>
>> ** 9:30-11:00     *Thursday *Morning session I ** (90 min)
>>
>> * PoP Tokens (60 min)
>>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
>> Distribution
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>>
>>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>>
>> * Distributed OAuth (30 min)
>>   https://datatracker..ietf.org/doc/draft-hardt-oauth-distributed/
>> <https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--000000000000ae6b3105709e9fe2
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Is it OK to me to present Incremental OAuth remotely? I&#3=
9;m not able to travel for this IETF, but am registered as a remote partici=
pant.=C2=A0 I think 20min might be enough to cover that draft timing wise, =
unless there is a lot of discussion.<div><br></div><div>Looks good overall,=
 and I appreciate being scheduled in the afternoon session on account of th=
e timezone difference.</div><div><div><br></div><div><br><div><br></div><di=
v><br></div></div></div></div><div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote">On Mon, Jul 9, 2018 at 9:48 PM, Dick Hardt <span dir=3D"ltr">&=
lt;<a href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@gma=
il.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"=
ltr"><font face=3D"monospace, monospace">Besides being the oddness that ses=
sion I happens after session II ... looks ok!</font><div><br></div></div><d=
iv class=3D"gmail_extra"><br><div class=3D"gmail_quote"><span class=3D"">On=
 Mon, Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.co=
m</a>&gt;</span> wrote:<br></span><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=
=3D"ltr"><span class=3D""><font face=3D"monospace, monospace">The following=
 is a draft agenda for next week.</font><div><font face=3D"monospace, monos=
pace">Please, let us know if you have any comments.</font></div><div><font =
face=3D"monospace, monospace"><br></font></div><div><font face=3D"monospace=
, monospace">Regards,</font></div><div><font face=3D"monospace, monospace">=
=C2=A0Rifaat &amp; Hannes</font></div></span><div><font face=3D"monospace, =
monospace"><br></font><div><font face=3D"monospace, monospace"><br></font><=
div><font face=3D"monospace, monospace"><span class=3D""><div>Web Authoriza=
tion Protocol Meeting</div><div>------------------------------<wbr>----</di=
v><div><br></div><div>** 15:50-17:20=C2=A0 =C2=A0<b>Tuesday </b>Afternoon s=
ession II ** (90 minutes)</div><div><br></div><div>* Chairs Update (15 min)=
</div><div><br></div><div>* OAuth 2.0 Incremental Authorization (30 min)</d=
iv><div>=C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth=
-incremental-authz/" target=3D"_blank">https://datatracker.ietf.org/d<wbr>o=
c/draft-ietf-oauth-incrementa<wbr>l-authz/</a></div><div><br></div><div>* R=
eciprocal OAuth (30 min)</div><div>=C2=A0 <a href=3D"https://datatracker.ie=
tf.org/doc/draft-ietf-oauth-reciprocal/" target=3D"_blank">https://datatrac=
ker.ietf.org/d<wbr>oc/draft-ietf-oauth-reciprocal<wbr>/</a></div><div><br><=
/div><div>* OAuth 2.0 Token Binding (15 min)</div><div>=C2=A0 <a href=3D"ht=
tps://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/" target=3D"=
_blank">https://datatracker.ietf.org/d<wbr>oc/draft-ietf-oauth-token-bind<w=
br>ing/</a></div><div><br></div><div><br></div><div><br></div><div>** 9:30-=
11:00=C2=A0 =C2=A0 =C2=A0<b>Thursday </b>Morning session I ** (90 min)</div=
><div><br></div><div>* PoP Tokens (60 min)</div><div>=C2=A0 OAuth 2.0 Proof=
-of-Possession: Authorization Server to Client Key Distribution</div><div>=
=C2=A0 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-dist=
ribution-03" target=3D"_blank">https://tools.ietf.org/html/dr<wbr>aft-ietf-=
oauth-pop-key-distrib<wbr>ution-03</a></div><div><br></div><div>=C2=A0 OAut=
h 2.0 Proof-of-Possession (PoP) Security Architecture</div><div>=C2=A0 <a h=
ref=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08" ta=
rget=3D"_blank">https://tools.ietf.org/html/dr<wbr>aft-ietf-oauth-pop-archi=
tectur<wbr>e-08</a></div><div><br></div><div>* Distributed OAuth (30 min)</=
div></span><div>=C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-ha=
rdt-oauth-distributed/" target=3D"_blank">https://datatracker..ietf.org/<wb=
r>doc/draft-hardt-oauth-distribu<wbr>ted/</a></div><div><br></div></font></=
div></div></div></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
<br></blockquote></div><br></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--000000000000ae6b3105709e9fe2--


From nobody Tue Jul 10 04:44:07 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9207130F79 for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 04:44:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LsADTktWOfWI for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 04:44:03 -0700 (PDT)
Received: from mail-ua0-x234.google.com (mail-ua0-x234.google.com [IPv6:2607:f8b0:400c:c08::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DA58130E6F for <oauth@ietf.org>; Tue, 10 Jul 2018 04:44:03 -0700 (PDT)
Received: by mail-ua0-x234.google.com with SMTP id x24-v6so13740485ual.10 for <oauth@ietf.org>; Tue, 10 Jul 2018 04:44:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ZQNJAM2xL9O6bVq/qYKjeX2hs/26TkaI0oUBX/o90tg=; b=PdyjJPv+vhdFXbCmzCmFWUlpmZcKJrgacBdJyETnFlK8pyJm2CTinhircA6Zfwg963 gUQobVyRhXSTO8OPg8WvVEK/az4Lda+qVPXDpSiSHoow6ikGT5HZRu6cPcwXphnqsB/0 +FFgRWm5anEi3DKhyndOWUgKAEGTmJqtaBeKYd9n+VrFr0pveU+DAuWcIFEiCN8tB6Ya dT1r4lcr2y0/EAojCFyGc4azkfszxlnfA6lFQoyawGMYv2RFVUeFb/QEJcbSPHADHF+V 3UOo6Gb+HbfjbIEgLveuNJFqBomUXqqedi2kF/gbLTsp04rvhC/2qS/ayfk5LBoZsaM0 8bcQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ZQNJAM2xL9O6bVq/qYKjeX2hs/26TkaI0oUBX/o90tg=; b=q6zO2+DPzMUWLers5JevitLhJIYtAgAkVwBG3Ox63XUQm3Kv+NfXpKeDr4ziUVJtY+ aCXUXuCnvovt8J/RRPLW62IYoaq8wUN5UnlqwAJijzIns3gwJ8cHxoas8Dc65Oryn8S2 b/8nalyloAk8Bb8nazk6Z+M/JnEl2Z1TgQ9oN5S8YzsRPdLEL9dq7ALz62sp9iSoWTQd d5pGyqGYakl5MaDcXt1VS3ZhLIIVWtdAoQ3SqYVedsFpI8Jmt0gLFRjvisHnXXjATGys W1HB9y826AhrMlda2dKjfWXmVSjhMXYOCZt8dRO/DF22pu+iu6hMHlhlHriR7oz5xEs3 foaw==
X-Gm-Message-State: APt69E0hTSbuiufBdFrwTP7D8KFzT6ThmzE9sBr/WIdcARk1KKHbFy5r iKCR3jkzn/39P2zbek5Vb4WOmZYA78IR5CMDZkM=
X-Google-Smtp-Source: AAOMgpcQGs9Z8q9XJN42ehSLRI1AgAnMLstLD88KF7nvZYTWiap7zZzZnMjFspmaI5y8gWQeUNIKCt4AmjlJytCm9SA=
X-Received: by 2002:ab0:51e7:: with SMTP id h36-v6mr15269837uaa.70.1531223042350;  Tue, 10 Jul 2018 04:44:02 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com> <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com>
In-Reply-To: <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 10 Jul 2018 07:44:33 -0400
Message-ID: <CAGL6ep+mAwJcbopetdki9ZUQSc+LKxJFa=0WBJa=7WHrHpKrrQ@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000082e3a30570a3a515"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/WZG-Fm17ey94KMdjac7_juof4ms>
Subject: Re: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 11:44:06 -0000

--00000000000082e3a30570a3a515
Content-Type: text/plain; charset="UTF-8"

:)
These are the day's sessions.

On Tue, Jul 10, 2018 at 12:49 AM Dick Hardt <dick.hardt@gmail.com> wrote:

> Besides being the oddness that session I happens after session II ...
> looks ok!
>
>
> On Mon, Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
>> The following is a draft agenda for next week.
>> Please, let us know if you have any comments.
>>
>> Regards,
>>  Rifaat & Hannes
>>
>>
>> Web Authorization Protocol Meeting
>> ----------------------------------
>>
>> ** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)
>>
>> * Chairs Update (15 min)
>>
>> * OAuth 2.0 Incremental Authorization (30 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>>
>> * Reciprocal OAuth (30 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>>
>> * OAuth 2.0 Token Binding (15 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>> <https://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/>
>>
>>
>>
>> ** 9:30-11:00     *Thursday *Morning session I ** (90 min)
>>
>> * PoP Tokens (60 min)
>>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
>> Distribution
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>>
>>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>>
>> * Distributed OAuth (30 min)
>>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>

--00000000000082e3a30570a3a515
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>:)</div><div>These are the day&#39;s sessions.</div><=
/div><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Tue, Jul 10, 2018 a=
t 12:49 AM Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail.com">dick.hard=
t@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=
=3D"ltr"><font face=3D"monospace, monospace">Besides being the oddness that=
 session I happens after session II ... looks ok!</font><div><br></div></di=
v><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jul 9, =
2018 at 7:42 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=3D"mailto=
:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</sp=
an> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><font face=3D=
"monospace, monospace">The following is a draft agenda for next week.</font=
><div><font face=3D"monospace, monospace">Please, let us know if you have a=
ny comments.</font></div><div><font face=3D"monospace, monospace"><br></fon=
t></div><div><font face=3D"monospace, monospace">Regards,</font></div><div>=
<font face=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</font></div><=
div><font face=3D"monospace, monospace"><br></font><div><font face=3D"monos=
pace, monospace"><br></font><div><font face=3D"monospace, monospace"><div>W=
eb Authorization Protocol Meeting</div><div>-------------------------------=
---</div><div><br></div><div>** 15:50-17:20=C2=A0 =C2=A0<b>Tuesday </b>Afte=
rnoon session II ** (90 minutes)</div><div><br></div><div>* Chairs Update (=
15 min)</div><div><br></div><div>* OAuth 2.0 Incremental Authorization (30 =
min)</div><div>=C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-iet=
f-oauth-incremental-authz/" target=3D"_blank">https://datatracker.ietf.org/=
doc/draft-ietf-oauth-incremental-authz/</a></div><div><br></div><div>* Reci=
procal OAuth (30 min)</div><div>=C2=A0 <a href=3D"https://datatracker.ietf.=
org/doc/draft-ietf-oauth-reciprocal/" target=3D"_blank">https://datatracker=
.ietf.org/doc/draft-ietf-oauth-reciprocal/</a></div><div><br></div><div>* O=
Auth 2.0 Token Binding (15 min)</div><div>=C2=A0 <a href=3D"https://datatra=
cker..ietf.org/doc/draft-ietf-oauth-token-binding/" target=3D"_blank">https=
://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/</a></div><div><=
br></div><div><br></div><div><br></div><div>** 9:30-11:00=C2=A0 =C2=A0 =C2=
=A0<b>Thursday </b>Morning session I ** (90 min)</div><div><br></div><div>*=
 PoP Tokens (60 min)</div><div>=C2=A0 OAuth 2.0 Proof-of-Possession: Author=
ization Server to Client Key Distribution</div><div>=C2=A0 <a href=3D"https=
://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03" target=3D"=
_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-0=
3</a></div><div><br></div><div>=C2=A0 OAuth 2.0 Proof-of-Possession (PoP) S=
ecurity Architecture</div><div>=C2=A0 <a href=3D"https://tools.ietf.org/htm=
l/draft-ietf-oauth-pop-architecture-08" target=3D"_blank">https://tools.iet=
f.org/html/draft-ietf-oauth-pop-architecture-08</a></div><div><br></div><di=
v>* Distributed OAuth (30 min)</div><div>=C2=A0 <a href=3D"https://datatrac=
ker.ietf.org/doc/draft-hardt-oauth-distributed/" target=3D"_blank">https://=
datatracker.ietf.org/doc/draft-hardt-oauth-distributed/</a></div><div><br><=
/div></font></div></div></div></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
</blockquote></div>

--00000000000082e3a30570a3a515--


From nobody Tue Jul 10 04:47:42 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D20C130F7B for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 04:47:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TOkveBnbVe4Q for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 04:47:38 -0700 (PDT)
Received: from mail-ua0-x22f.google.com (mail-ua0-x22f.google.com [IPv6:2607:f8b0:400c:c08::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33D40130E6F for <oauth@ietf.org>; Tue, 10 Jul 2018 04:47:38 -0700 (PDT)
Received: by mail-ua0-x22f.google.com with SMTP id t14-v6so13751041uao.8 for <oauth@ietf.org>; Tue, 10 Jul 2018 04:47:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GIN7KlGxzcaA+uSqWIV44yH9vE40Yje2bDGpL5a4bWA=; b=DW6ZFyY1584fBgzMtvdYKrX2bj1t7QPfP9mxsIN5nUY7LWxzEspZzaVKkPv425m70J nLPniif1OCXLbIleD7a+WIikAfnC4bkoIq5K8ViMNws+r1i8WAPFjNOc5aXsOfen9nV2 cNLY+rkMNWJmuF5fmJ6D03LKnyQAxIe0CAYrjzpvxkiNUxwbGY9X9Lqg/+XClkkuOYJz t+CODb2pWTufqUp5R9pHlpnVUU1u6X5XbIQi5ItP4FkoD3484immxVCwda/FtxFjyghM G/FBzxi+nc+i17obTDmXWtBuFvI4eNu8N7+CFQj13M0nQCCYUQfHGW3jEZzA5vk8XANg q0YQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GIN7KlGxzcaA+uSqWIV44yH9vE40Yje2bDGpL5a4bWA=; b=Hyxhh2U9G9q0Vy/Y5BRdL+tH3vf7q8C7Cn4OXCRcE8btu0EW4M+0znoKtjpB+pWuE1 nEEfrip69qnXwk22REFtLK6ZM2FFclt63/gX5aE7s5oMut30HKBqcXaAJZYjkyGPSttL cr5KfLZTdKykFRFu9hCXSa4XoE+3TLFmPbZiKEtwmbP9fxjg4qh1Kx4GYHviY5Muyrb/ fcU8uPtHUPCN2vx1/PQ2VX/4si7Fd60zRRJq7QMfjLy0JE6dbIU4zLFHgMrMcU/SDVEK mSE7s/ia2Nb1131GG9xwJ8FYn3mDe6VKq0eawJJK1nndrLJWgnwXaBg3eCWYu39w3E0g yz3g==
X-Gm-Message-State: APt69E0PbEoQNuK/LQDjfOmixRzbzA9GQ/Ap4J2+9AN7UId+/G4w5kkr VBmJKGOowNtETFqnu2erFd1rQTBHYyU6fvxPybA=
X-Google-Smtp-Source: AAOMgpfMzvdfJcA1YGljHMMhO01LmwoMj51HvMV/Lv/KbJqUqTA0Dyihko76B4HC0yANZP1PgNDa+MTIkIA+WlaA/Wo=
X-Received: by 2002:a9f:2633:: with SMTP id 48-v6mr14991931uag.182.1531223257300;  Tue, 10 Jul 2018 04:47:37 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com> <CAD9ie-uq8cO1s7-ESG8e22mcqTnfz9qa-326rPvhSoSR8_f-Ug@mail.gmail.com> <CAAP42hDvVFY6v=Gq=S0V=m8f1SwbxDXNd-J1h6Z-7ivamvts1Q@mail.gmail.com>
In-Reply-To: <CAAP42hDvVFY6v=Gq=S0V=m8f1SwbxDXNd-J1h6Z-7ivamvts1Q@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 10 Jul 2018 07:48:08 -0400
Message-ID: <CAGL6ep+SyWpUCwkY20CGN5k6QMrCn2AyFGy69x3zDnf+gFnmBg@mail.gmail.com>
To: William Denniss <wdenniss@google.com>
Cc: Dick Hardt <dick.hardt@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000052c29e0570a3b22e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/cR9q3zx7S4kjeTInOhyzwtQs1Ik>
Subject: Re: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 11:47:41 -0000

--00000000000052c29e0570a3b22e
Content-Type: text/plain; charset="UTF-8"

You absolutely can present remotely.
Let us know if you need any help with the setup.

Regards,
 Rifaat




On Tue, Jul 10, 2018 at 1:44 AM William Denniss <wdenniss@google.com> wrote:

> Is it OK to me to present Incremental OAuth remotely? I'm not able to
> travel for this IETF, but am registered as a remote participant.  I think
> 20min might be enough to cover that draft timing wise, unless there is a
> lot of discussion.
>
> Looks good overall, and I appreciate being scheduled in the afternoon
> session on account of the timezone difference.
>
>
>
>
>
> On Mon, Jul 9, 2018 at 9:48 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
>
>> Besides being the oddness that session I happens after session II ...
>> looks ok!
>>
>>
>> On Mon, Jul 9, 2018 at 7:42 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com
>> > wrote:
>>
>>> The following is a draft agenda for next week.
>>> Please, let us know if you have any comments.
>>>
>>> Regards,
>>>  Rifaat & Hannes
>>>
>>>
>>> Web Authorization Protocol Meeting
>>> ----------------------------------
>>>
>>> ** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)
>>>
>>> * Chairs Update (15 min)
>>>
>>> * OAuth 2.0 Incremental Authorization (30 min)
>>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>>>
>>> * Reciprocal OAuth (30 min)
>>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>>>
>>> * OAuth 2.0 Token Binding (15 min)
>>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>>> <https://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/>
>>>
>>>
>>>
>>> ** 9:30-11:00     *Thursday *Morning session I ** (90 min)
>>>
>>> * PoP Tokens (60 min)
>>>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
>>> Distribution
>>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>>>
>>>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>>>
>>> * Distributed OAuth (30 min)
>>>   https://datatracker..ietf.org/doc/draft-hardt-oauth-distributed/
>>> <https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>

--00000000000052c29e0570a3b22e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">You absolutely can present remotely.<div>Let us know if yo=
u need any help with the setup.</div><div><br></div><div>Regards,</div><div=
>=C2=A0Rifaat</div><div><br></div><div><div><br><div><br></div></div></div>=
</div><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Tue, Jul 10, 2018 =
at 1:44 AM William Denniss &lt;<a href=3D"mailto:wdenniss@google.com">wdenn=
iss@google.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
dir=3D"ltr">Is it OK to me to present Incremental OAuth remotely? I&#39;m n=
ot able to travel for this IETF, but am registered as a remote participant.=
=C2=A0 I think 20min might be enough to cover that draft timing wise, unles=
s there is a lot of discussion.<div><br></div><div>Looks good overall, and =
I appreciate being scheduled in the afternoon session on account of the tim=
ezone difference.</div><div><div><br></div><div><br><div><br></div><div><br=
></div></div></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail=
_quote">On Mon, Jul 9, 2018 at 9:48 PM, Dick Hardt <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.co=
m</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">=
<font face=3D"monospace, monospace">Besides being the oddness that session =
I happens after session II ... looks ok!</font><div><br></div></div><div cl=
ass=3D"gmail_extra"><br><div class=3D"gmail_quote"><span>On Mon, Jul 9, 201=
8 at 7:42 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=3D"mailto:ri=
faat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</span>=
 wrote:<br></span><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><span><fo=
nt face=3D"monospace, monospace">The following is a draft agenda for next w=
eek.</font><div><font face=3D"monospace, monospace">Please, let us know if =
you have any comments.</font></div><div><font face=3D"monospace, monospace"=
><br></font></div><div><font face=3D"monospace, monospace">Regards,</font><=
/div><div><font face=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</fo=
nt></div></span><div><font face=3D"monospace, monospace"><br></font><div><f=
ont face=3D"monospace, monospace"><br></font><div><font face=3D"monospace, =
monospace"><span><div>Web Authorization Protocol Meeting</div><div>--------=
--------------------------</div><div><br></div><div>** 15:50-17:20=C2=A0 =
=C2=A0<b>Tuesday </b>Afternoon session II ** (90 minutes)</div><div><br></d=
iv><div>* Chairs Update (15 min)</div><div><br></div><div>* OAuth 2.0 Incre=
mental Authorization (30 min)</div><div>=C2=A0 <a href=3D"https://datatrack=
er.ietf.org/doc/draft-ietf-oauth-incremental-authz/" target=3D"_blank">http=
s://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/</a></div><=
div><br></div><div>* Reciprocal OAuth (30 min)</div><div>=C2=A0 <a href=3D"=
https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/" target=3D"_b=
lank">https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/</a></di=
v><div><br></div><div>* OAuth 2.0 Token Binding (15 min)</div><div>=C2=A0 <=
a href=3D"https://datatracker..ietf.org/doc/draft-ietf-oauth-token-binding/=
" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-token=
-binding/</a></div><div><br></div><div><br></div><div><br></div><div>** 9:3=
0-11:00=C2=A0 =C2=A0 =C2=A0<b>Thursday </b>Morning session I ** (90 min)</d=
iv><div><br></div><div>* PoP Tokens (60 min)</div><div>=C2=A0 OAuth 2.0 Pro=
of-of-Possession: Authorization Server to Client Key Distribution</div><div=
>=C2=A0 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-dis=
tribution-03" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oaut=
h-pop-key-distribution-03</a></div><div><br></div><div>=C2=A0 OAuth 2.0 Pro=
of-of-Possession (PoP) Security Architecture</div><div>=C2=A0 <a href=3D"ht=
tps://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08" target=3D"_=
blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08</a>=
</div><div><br></div><div>* Distributed OAuth (30 min)</div></span><div>=C2=
=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distribut=
ed/" target=3D"_blank">https://datatracker..ietf.org/doc/draft-hardt-oauth-=
distributed/</a></div><div><br></div></font></div></div></div></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
</blockquote></div>

--00000000000052c29e0570a3b22e--


From nobody Tue Jul 10 05:00:49 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E44AC13111B for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 05:00:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4o5aGXNMqamQ for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 05:00:40 -0700 (PDT)
Received: from mail-ua0-x229.google.com (mail-ua0-x229.google.com [IPv6:2607:f8b0:400c:c08::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEF06130FA5 for <oauth@ietf.org>; Tue, 10 Jul 2018 05:00:39 -0700 (PDT)
Received: by mail-ua0-x229.google.com with SMTP id y8-v6so13774474uan.3 for <oauth@ietf.org>; Tue, 10 Jul 2018 05:00:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=oymZF7fg8/JnvFzxumqz+VI2H2o0j40+4Ow04IYKkDw=; b=YcOaEhU9BWsON7bRTn6uLSKOX6+xLJfRT+PD7+Q/2tKtH/RAJo/fIMUzCv0pvOIlj3 KtSo84oWv5iH9g4LrmKIw+MFaON0dw5iWfzrTPHFYae1eYR/boGCTV54KjqoAGkZOw6p UVnk+IvVNH5Lrb+jU59Qc1hlDL41D2V7R3C4Kz1rDwUcYrLkLTBiYha8l8lUyAqTZj36 MmAaNt3aODHn7N7nUaahQnOKetseOStxL78qDS07oEBelPd62g2gDd8lqkMHO6JYaGRr PNLciaRn7U8eqo+iIz2DPKGWGSam1+SX/vyCPg0OWEx/IbG6jfHewSZWDRRLKdhI1wzm Wu4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=oymZF7fg8/JnvFzxumqz+VI2H2o0j40+4Ow04IYKkDw=; b=FbyLRMQ0Aw25veoS4Rc1ttSzjMetsFgbBYS8AtyIA0Npb6aoleo2wSHuJuP0kTUewR ADaTEShaBkAj/zSrYmBAOOa1fK4qC8sLCjRFlZEzCs4pgo0jicZJTRckPgQXCCmQQZWr ZjFrSu1Ccis4U5BTlmxfl91QjIR6VyEAgHAFAdlBfWn8RJzWW7Yz5kks4hs2s/3NAtEw dlZzVNmyRD9EU5fSe5/zuFWhAhXtfUzVaNB01npZOLQy+Kjazb7DO8QAL8wkqnXCkKgB B2yLeMbGAl37X1PEemdXDIhfBQcTTYG/OdU3OBtlEhvfCgOrTK4kjBE8KHl75wAkrBCc f65w==
X-Gm-Message-State: APt69E1niaBi5sm0l98LhlfUVV6PfqQcnjzYGwhlzNxv6unq2UBzMZyb aPefTbB32Vl5c9YGi2UAnmn+h1Zd5suJegMoGXXlCvqO
X-Google-Smtp-Source: AAOMgpezOX/Mq85v0LwpWN3V0bS4BSrRt3KCmKuSieSOwHqlnq49GkqlhMnenang5M935IrqBO0zH9Icp6uOu14tj04=
X-Received: by 2002:a9f:2633:: with SMTP id 48-v6mr15017980uag.182.1531224038903;  Tue, 10 Jul 2018 05:00:38 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com>
In-Reply-To: <CAGL6ep+NVBb_Zt6_J1FB0ZvmY3houWrW7_258523b4cBe+Xuqw@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 10 Jul 2018 08:01:09 -0400
Message-ID: <CAGL6epJ42bVbsLx=h87018mEs_KNmEjEi8ZkSuuoVwuj_EuiMg@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e913d60570a3e0b4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/DFpc-qZedG8QjaleEkVplS9CUGc>
Subject: Re: [OAUTH-WG] OAuth WG draft agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 12:00:48 -0000

--000000000000e913d60570a3e0b4
Content-Type: text/plain; charset="UTF-8"

Here is a link to our final agenda:
https://datatracker.ietf.org/meeting/102/materials/agenda-102-oauth-00

Regards,
 Rifaat


On Mon, Jul 9, 2018 at 10:42 AM Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> The following is a draft agenda for next week.
> Please, let us know if you have any comments.
>
> Regards,
>  Rifaat & Hannes
>
>
> Web Authorization Protocol Meeting
> ----------------------------------
>
> ** 15:50-17:20   *Tuesday *Afternoon session II ** (90 minutes)
>
> * Chairs Update (15 min)
>
> * OAuth 2.0 Incremental Authorization (30 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>
> * Reciprocal OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>
> * OAuth 2.0 Token Binding (15 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>
>
>
> ** 9:30-11:00     *Thursday *Morning session I ** (90 min)
>
> * PoP Tokens (60 min)
>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
> Distribution
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>
>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>
> * Distributed OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>

--000000000000e913d60570a3e0b4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Here is a link to our final agenda:<div><a href=3D"https:/=
/datatracker.ietf.org/meeting/102/materials/agenda-102-oauth-00">https://da=
tatracker.ietf.org/meeting/102/materials/agenda-102-oauth-00</a><br></div><=
div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div></di=
v><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Mon, Jul 9, 2018 at 10=
:42 AM Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifa=
at.ietf@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><d=
iv dir=3D"ltr"><font face=3D"monospace, monospace">The following is a draft=
 agenda for next week.</font><div><font face=3D"monospace, monospace">Pleas=
e, let us know if you have any comments.</font></div><div><font face=3D"mon=
ospace, monospace"><br></font></div><div><font face=3D"monospace, monospace=
">Regards,</font></div><div><font face=3D"monospace, monospace">=C2=A0Rifaa=
t &amp; Hannes</font></div><div><font face=3D"monospace, monospace"><br></f=
ont><div><font face=3D"monospace, monospace"><br></font><div><font face=3D"=
monospace, monospace"><div>Web Authorization Protocol Meeting</div><div>---=
-------------------------------</div><div><br></div><div>** 15:50-17:20=C2=
=A0 =C2=A0<b>Tuesday </b>Afternoon session II ** (90 minutes)</div><div><br=
></div><div>* Chairs Update (15 min)</div><div><br></div><div>* OAuth 2.0 I=
ncremental Authorization (30 min)</div><div>=C2=A0 <a href=3D"https://datat=
racker.ietf.org/doc/draft-ietf-oauth-incremental-authz/" target=3D"_blank">=
https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/</a></d=
iv><div><br></div><div>* Reciprocal OAuth (30 min)</div><div>=C2=A0 <a href=
=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/" target=
=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/</=
a></div><div><br></div><div>* OAuth 2.0 Token Binding (15 min)</div><div>=
=C2=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-b=
inding/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oaut=
h-token-binding/</a></div><div><br></div><div><br></div><div><br></div><div=
>** 9:30-11:00=C2=A0 =C2=A0 =C2=A0<b>Thursday </b>Morning session I ** (90 =
min)</div><div><br></div><div>* PoP Tokens (60 min)</div><div>=C2=A0 OAuth =
2.0 Proof-of-Possession: Authorization Server to Client Key Distribution</d=
iv><div>=C2=A0 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-=
key-distribution-03" target=3D"_blank">https://tools.ietf.org/html/draft-ie=
tf-oauth-pop-key-distribution-03</a></div><div><br></div><div>=C2=A0 OAuth =
2.0 Proof-of-Possession (PoP) Security Architecture</div><div>=C2=A0 <a hre=
f=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08" targ=
et=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture=
-08</a></div><div><br></div><div>* Distributed OAuth (30 min)</div><div>=C2=
=A0 <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distribut=
ed/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-hardt-oauth-d=
istributed/</a></div><div><br></div></font></div></div></div></div>
</blockquote></div>

--000000000000e913d60570a3e0b4--


From nobody Tue Jul 10 05:50:54 2018
Return-Path: <farezeysz@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50386130E5F for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 05:50:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NcyCQLtEvk8w for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 05:50:45 -0700 (PDT)
Received: from mail-qt0-x22b.google.com (mail-qt0-x22b.google.com [IPv6:2607:f8b0:400d:c0d::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11F9F12F18C for <oauth@ietf.org>; Tue, 10 Jul 2018 05:50:31 -0700 (PDT)
Received: by mail-qt0-x22b.google.com with SMTP id z8-v6so9625431qto.9 for <oauth@ietf.org>; Tue, 10 Jul 2018 05:50:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=date:from:to:message-id:subject:mime-version; bh=O3xXJxmuCxAO8s4VRvDySJyDfDLwi2B/X1CINX6ypTA=; b=KytCIIW1/WnpynEJdkqnG5429Omrh44KsdsCQh60ZboHoL2as0naHy6PUybbp+Xk3B V0+I+JaIqyxJynfI2GhiBl5+RkLL9BkNsJI4ZNWRLapjOzYvVpkQMcnKVBtR+idXn4S0 dBJ/sfr8HXkc+Po8CGAny/NyLIexPoWHM09dVR3LFu+jh2k0WF/by4/CgP7pNjcjwB6M MnaYiHkUDioey+r9h5bPC98Id+LgbHGcInu4kSwQ8TWANGyk13zRGG9yz9Ch1n5h2ICg M/0WsmUhVv16Yq3ynTV6Rnz6h8gGKhotFNoIUxBIklMbpTBE6JYDJaykGVYj0DK71lSf jf7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:message-id:subject:mime-version; bh=O3xXJxmuCxAO8s4VRvDySJyDfDLwi2B/X1CINX6ypTA=; b=nj+DwCoNxMVzwZgH3b6BU2nA7/dbjUBPdnb62jdvLpPUgq2xOaJDcA75YMraGr+Kc4 N2o8KNGmeL89khUANYV3+BvYe0siZaVpvqGmyntV9Rm6dfZvtmV/S80aQ5nGFkyz+unb AKOyfFbovZn6YDswStxTa2KMo4OhXTnnhokebxVK2A0wsuazLo+V1Pa5BkIJTOJ5EZXe MxgaOQrh1d6P2gAWvkWdgix95FmZ310xp2UO5lq7YeQ4rkWypomxVNr54lWKvUZcu/nr J4O7wJlvPdEuNIrZZNUB4vKdLKv+G3bTTwKw0yjySjFiPkjo1vPr0SmJVAwR+Cfwzk/R hncg==
X-Gm-Message-State: APt69E3V3yn+D4fvgDL9qBGzdkVjOyDb0VzWeyrF78vLIdsGeNN9mYhX nJASf1PTZlV61GlyWDkERqhy1Mit
X-Google-Smtp-Source: AAOMgpdGyKPG1Ru7QiA5ut6SL4ZPFOpfSMky5jASbZLqUQXG1Z6qTBdawE8I+olWxouAwgVYtx5lfQ==
X-Received: by 2002:a0c:8a1b:: with SMTP id 27-v6mr21490791qvt.159.1531227029606;  Tue, 10 Jul 2018 05:50:29 -0700 (PDT)
Received: from mail.outlook.com ([40.76.67.137]) by smtp.gmail.com with ESMTPSA id y128-v6sm11852523qkc.1.2018.07.10.05.50.28 for <oauth@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 10 Jul 2018 05:50:28 -0700 (PDT)
Date: Tue, 10 Jul 2018 12:49:57 +0000 (UTC)
From: Eysz 7Words <farezeysz@gmail.com>
To: <oauth@ietf.org>
Message-ID: <C01414EF80E127A6.D474E19F-7BCE-4A38-9B7E-1D29BF1E36D7@mail.outlook.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_9452_1236375668.1531226997911"
X-Mailer: Outlook for iOS and Android
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/RpB-4qrJxugfLjt8rJ-KzX1IHwQ>
Subject: [OAUTH-WG] (no subject)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 12:50:49 -0000

------=_Part_9452_1236375668.1531226997911
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit


  
  


  
  
  
    
    	
    	eysz@ietf.org
    	

    	Dapatkan Outlook for iOS
    
  

------=_Part_9452_1236375668.1531226997911
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html dir=3D"ltr"><head>
  <style id=3D"ms-outlook-ios-style" type=3D"text/css">html {
background-color: transparent;
}

body {
color: #333;
line-height: 150%;
font-family: "-apple-system", "HelveticaNeue";
margin: 0;
}

.ms-outlook-ios-reference-expand {
display: block;
color: #999;
padding: 20px 0px;
text-decoration: none;
}

.ms-outlook-ios-availability-container {
max-width: 500px;
margin: auto;
padding: 12px 15px 15px 15px;
border: 1px solid #C7E0F4;
border-radius: 4px;
}

.ms-outlook-ios-availability-container > .ms-outlook-ios-availability-delet=
e-button {
width: 25px;
height: 25px;
right: -12px;
top: -12px;
background-image: url("data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAEsAAA=
BLCAYAAAA4TnrqAAAAAXNSR0IArs4c6QAACxpJREFUeAHlnFuMXlUVx/fcOzNtp0ynF0U7hWKrE=
mKLosZEjUZ9MgZIQBNC0uAtJr745oOJIT74xgskJkQbAlQNJmBMfNDEG0YjEC7GIBQZ6IAI005L=
79O5+/+dfut0f5dzzt7nu8w37UrWt893zt5rr/U/e6+zL+ucHrcGtLq62q9qd4gnxTeKb6kcc26=
7eEI8Kz4mnhFPi58Rv1g5nunp6VnS8ZVHAqdHPCk+KP6zuBWEHORNinvWNWoYIN4q/o74mLidhH=
zqob71AxzKij8g/p14LYh6qb97QUM58T7x38TdQOiBPt0FmhQaEf9M3I2EXiNr7tOkBK3pVvGCu=
JsJ/dCzqVbWWxZxVTygso+InxBz3M2Efuj5SEXvUrqWQloV7lRtT4vfX6rWtS30pqr/uMZp78Sq=
EQ2WgPqQKvmnuKWtaWnFuaWVVbciXl51rk+a9fb2uP6EY80qzL+oHB8RYC8V5vQyRIEloD6tsk9=
65UsdAsyZ+WV35uKyOz+/4uZ0YgmEMqhfyA3397rRoV63eUOf2zzUJxAzMsed/owA+2tokWCwmg=
VKDcadvLDsZs8vutMXV5zkhepYl08GurENvW5idMCNj/Q5Nb5mKBiwoGoqXe/fZTQCkmNnl9x/T=
y+4xZzW0yeLB9WC6Hp0QbLSJRd0sAzSGTSgzO8bG3TbN/W7IGMay/lwSJcslC+gcOZviKN9FC3p=
jVML7uKi+l0NDakf0Sq2DPe5kYFeh9FZBMgXJOPU3HLSOufpxzW0QTJ2bRlMZNZcCvmLD9slwHK=
dfraGKi2gAGhKHPXUm1tcdVMn5t05+SWfMGjbaL+7RiABUFkCuHd1I46fX6q7ERvlz/ZsHXLDA7=
mmNaqap+QeAQZwDSlTooDiGuOouxqWzDjJ3X91dj55slkWWs216io7musqJi5N6Zwz6uJv1XRxn=
qA3TAwlrTbNHHZwWNnuFmAN+30eWLeqIAO5YHr7zKK63WLqvPFDOzcNuPeODSR+KFhQZEb82/9O=
L7p3zi6m/k0Gq1sOuPdsjvYet6nsrxup0BAstSrmUqfEQTVxG147seCOn7vcguly+7ZtKNMdGuk=
ZdI7uf+T4xaquuW3jgLt+62CM88eILQLsQm2ldY6j0v3uV8YgoBBYC9SYxkI37RzuKFDogZ+iXu=
o34gaiXwRh9/0VHKqK1bUsZdqnHC9X5cr5Q9ebfveyMnS73eODOSU6c+noyYWkW1ptk9cMxnbJD=
6p1HbHypFUtq4LmIT9D3jHOHB9l1C1AoQ83DH2M0BN9I+hQbeuqAkuCbhB/KkQg/oGnngQm2Wn6=
3dCifN3Rx7okeqIvegcSOIBHSilYFRQfSK8UHDCOYuIL4cz3ypl3I6EX+kHoi94R9IDfulKwJGB=
c/KUQQYzMbcDJ8ICnXp8vKURIh/Kg1yX9Lrln9Eb/QAIPcEnIN/FOO5mX0paYwhjhF0qMlq14R1=
L0q/ZfCy64MzqX4pKAVWlq94ZozqTY5nqMzBlwrgdCT5t/oj92BNK91hWtZe1SwW1FhXFRrB4YM=
YXJmf9atiRl7vvz52fd4/86GXNXq2TYH1oFch59blZ+yM7mp+iJvkbYkbOYYdlIwQV8HNvo0Ocu=
Jfm/9HVbZsFpMtcLpV++MOvuPvyfJPs9n9jufnrnnphRdVoNQH3jsSl36Cl29l0i466b2e0vJvR=
lSkTLwg7smRi9PIDNkQA+D1nL+nZOxvQSC3dGrB7oZgXTcOWJRAEMxeAIv5HUUwsUJ325SaacH/=
RFbyPfHjuXkR7kfK/6I03sk/zJI5o7K5xGLLPE0O03jTtalFEsYI2AQt5tkhtDvt7YE9iNPyuck=
pXsj4VUxnq5CiRZWbiLXY/irtL1ygCWBVSZroze6A9hD3YF0g5KMRcsJDYYjFjhLENlAGslUKaz=
r79vl13PSCeDwWIXxoil4LIUA1g7gEJvX3/frgKbbgSsvQWZkstsVxnFdkErZ2kIYO0CCh18/X2=
7TL+M9BbA2ppxMT0NTravx/TGBndphhIHeYCx8ukPDxDfzHCjVj30xw4Iu7x2UJvV/z/Jc3STf6=
bRsU2YucZ2VavIAEOejZtIn5w6qxWCubSaVgJlQrFjrjIqxT7W7QsocfCFYPn7dnZHCgQHXzbA/=
Kdku4FCOd8O374cxXfSDYdzMiSX/GlB8Q0oklZ/HcAevGOPdmSqVeE/5wvveb3IwjO+Hb59OQXH=
AatuYb62QAnBtSJy/+PMv/WrqaquRwFaGOe53mrCLxoFepZZwDpnhbLSEk02S1TdeXSudeZ+C4s=
d6ddVkHGC0AAjQgYC6BhgnS3K6Ds/Yg9aRY2Awne9/P39pUb6MXr5dvj25ciYAawTORmSS8wOCP=
uBcIa28pCcKPmTBRRTGKoqOzUKUQf9zaljV2X2U1R0GrBeKcrFdeKjjIg1aIbygLIOQdouwHz9f=
bsKbHoGBKr2xrIKEEhmFLmlZMWSNAQoK9AuwHz9fbus3oz0xWCwiLYziljwtyJJGgOUFWwHYL7+=
RBIGUtINnw3JjFCCLSDio/ymHFK+DFAmt5WAobfFd2GP3wisvox0plcFpnXxtYwM6WlcFqGJRsR=
HxdATWjO3KQ3lYqcwWYAhN4Z8vbHHc8V5Yv4inJbM+j/l5bRrxHAaEUhGawmlOe+hEAuU1dEIMF=
+u5ctK0Re9jXx77FxG+hDnqZ8Vw68p+QXHecQ47vm3LqRDh93jQ9qPu7ymnVeWmT2bFqyZs8ScV=
JxXIOcaRtOiAOqr+ydCW4c2K5bc0ZOXdqRZeThw7Uho8O5ueqCBtVH1E085mqNjcolIu9e9Cver=
wsoQrKjoml5nLP2Cd6Ov040O3J06LsV3CKzVpBvqgClPUJQfUcEWO8Dgjoi79UDoaYNp9MeOQPo=
hQJHXfBbHD/NTRDRFooKN2IeLiEyxYh1N0e9t6WmE/hFu4DEr54P1B50MGs2z4E9UMMS0gdDE5e=
YG9YmsdvygF/rZxBm9/Q2Lgjp/r+vp4zYFS00Nc39cUDi9TPi0TUDZ4X1FCnUjoZfFZqAvekfQd=
60LUiYFqyLgUaXTlePchMgUwqclLMl3WvtvhCZ2E6EPekHoib4RET9/V7FXk8KVnyqwJJBByI/8=
DHnHbCkRPm2E/+oWwGpjStHT3wIznXPSe/xWRb4qsCoFDyl9qnJcmBBnTvi0EYC9NLN2PgwfRf3=
oYYR+kfHwYFDnvxs+FDRIPaDMfHQiaJbJc7U2vJvH85UWB98QLNnOqP4+Jd/jOJTW+g0Lhgf21M=
NHdeQNC8ARWAymcHIf5X8osVZ01b27AzgC7Holz4nH+B9KDAKvqrfCDBgB9hUdPy4O8l9WjpRFt=
qvmfUMzXIB9U8cP2v+YFOcf8yYr227sTLHCwexgXb3JasAIsB/oOHgMZuUsxXha2hX/jrQZ3Cxg=
Joe1LSLuCCSLfvteczuWuANXOK3KrDT4ZXIEZA4dsqRXuuRPdD3ah2XJ5DwAEs1C16MV0hXpksz=
nWgSMXz0j1vZ+18FqE2A4/YfFUU9JK7/G6Zuqv9QXQxpNdwpt0YDvN8p0szhoZ6hQYOcyHFZVvD=
Se+5Z9W9RRCxsU3ydeEnczteQrRy0BUSgdEP+jS9Hqju9n+UgLKL6l9XXx0S4BrTu/zFYDWr/AO=
ig+skagdf83/3zAOBZQvOryRTEf+Donbid15GuS0eOsWlBC/gsl9iW/LP6C+PPi68TN0usS8Ecx=
H6z4be2qZrPCG5XvCFi1FQu8SZ1j6YdXYeC9YuLxiZyGicQltpuoRPiEmJVLwqPgZwXOtNKO0v8=
BzRAPSFNM7HEAAAAASUVORK5CYII=3D");
background-size: 25px 25px;
background-position: center;
}

#ms-outlook-ios-main-container {
margin: 0 0 0 0;
margin-top: 120;
padding: 8;
}

#ms-outlook-ios-content-container {
padding: 0;
padding-top: 12;
padding-bottom: 20;
}

.ms-outlook-ios-mention {
color: #333;
background-color: #f1f1f1;
border-radius: 4px;
padding: 0 2px 0 2px;
pointer-events: none;
text-decoration: none;
}</style><meta name=3D"viewport" content=3D"width=3Ddevice-width, user-scal=
able=3Dno, initial-scale=3D1.0"></head>
  <body style=3D"-webkit-tap-highlight-color: rgba(0, 0, 0, 0); font-size: =
16px;"><!-- This file has been automatically generated. See web/README.md -=
->


 =20
 =20
 =20
    <div style=3D"direction: ltr;">
    =09
    =09<div style=3D"direction: ltr;">eysz@ietf.org</div>
    =09<div><br></div>
    =09<div class=3D"ms-outlook-ios-signature">Dapatkan <a href=3D"https://=
aka.ms/o0ukef">Outlook for iOS</a></div>
    </div>
 =20
</body></html>
------=_Part_9452_1236375668.1531226997911--


From nobody Tue Jul 10 11:19:44 2018
Return-Path: <janthoe@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D7DC131028 for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 11:19:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id etPZWdTPMr1f for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 11:19:40 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 586EA130DCE for <oauth@ietf.org>; Tue, 10 Jul 2018 11:19:40 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id q11-v6so18874548oic.12 for <oauth@ietf.org>; Tue, 10 Jul 2018 11:19:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=FgQyyJyxM+762z5CCeoD+w0uA+E8+3EnfYjCHOC+oIA=; b=qUEW9xa8eYcLsIQQy1DPtz1163kzkxkR4RQNxPQALH7oPmWVqIQ/tJ/TIYxn9rzFwi tuT54XwYP0456cfli7Gr0L0hp4qVsL92xNBGEBoX+hW6/LmDZ2DXRpuB3Kf+rYUir5rA TSu3JrQs0td62qGXVunBfYec0r6wpkTbOZiUuJGG+V+yrlCOO9d8kpW+bbjPJvIUS620 v+99XIfagbPL14avqxj+Taz9fzjsHFB9+pHSfMfN7aCpiBUy74t3TPTG2anYfMmygKeM cbaCmAtEjbj4aZkG7aspl7ovQL760Pr/HN6GLQrDHU8n7ABCeYmQw+7uXUQq1mjJgeKV LqBg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=FgQyyJyxM+762z5CCeoD+w0uA+E8+3EnfYjCHOC+oIA=; b=C8giA0FifB2dPr/2i2d+iq0Rh3xIFEoBH1xwyVwv3bLEkdJWlXNJa73F+EW5usKnKa fqYoN2pwefIYlricrZ3oOepil3QE8TN1dj7GT1PRB021T1pgTBnr1tOOoChf12qIjyUB yoeqRTluApfnKiC0yrWC4DrVw3fcnCp6EOjQt6yrqiw0XL7TZEBXr+RROf/j8GXaKIzG JwQwv+FuZxl2kyokAEjBY2oaoWi5juv/jfimL7yb8P7VvdC7lYeMGi+c8I/1Y8HKgD7k cdChFN68JqhNrEriD0YfSoE7eh489cIg7F6xqzZ48s/CbDj5kegUOSTFpuyjdCJ+rW6f zkCw==
X-Gm-Message-State: APt69E37A3JRvyMdNXmjQkFDyyKKo5XdhQvepHxhKy0tuSr3zqGiPbsW n/QMzFEDnQTE7n4/iVfoh9jatJ2+UbNSzzfo3l1kMA==
X-Google-Smtp-Source: AAOMgpeXVReAP1W1Iacl2cBOqQ/dFvNq5PT+7yp9mYT37G/YnCPFH4wv6J6lV0EQKAqehQG7zDV44SN0W5lVWoXn/xc=
X-Received: by 2002:aca:cf97:: with SMTP id f145-v6mr30070871oig.131.1531246779648;  Tue, 10 Jul 2018 11:19:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a9d:2369:0:0:0:0:0 with HTTP; Tue, 10 Jul 2018 11:19:19 -0700 (PDT)
From: Andres Torres <janthoe@gmail.com>
Date: Tue, 10 Jul 2018 14:19:19 -0400
Message-ID: <CAEdHPxrSNT0N4CiaDv+rzhh44m0g4zqUNwFq85tp6kMeVC7h-w@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="0000000000005d4fa70570a92cdc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/JDY2vxJWbDoW_pzUVwmghfS2Jao>
Subject: [OAUTH-WG] Mail regarding draft-ietf-oauth-discovery
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 18:19:43 -0000

--0000000000005d4fa70570a92cdc
Content-Type: text/plain; charset="UTF-8"

Regarding RFC 8414 (Proposed Standard) Section 3.1.  Authorization Server
Metadata Request:

   If the issuer identifier value contains a path component, any
   terminating "/" MUST be removed before inserting "/.well-known/" and
   the well-known URI suffix between the host component and the path
   component.  The client would make the following request when the
   issuer identifier is "https://example.com/issuer1" and the well-known
   URI suffix is "oauth-authorization-server" to obtain the metadata,
   since the issuer identifier contains a path component:

     GET /.well-known/oauth-authorization-server/issuer1 HTTP/1.1
     Host: example.com



In terms of API design the final result is confusing. The resource
/.well-known/oauth-authorization-server becomes a collection of resources
where issuer is a subresource. However,
/.well-known/oauth-authorization-server should be a subresource of the
issuer/tenant. It is my understanding that .well-known is a prefix for
known resources in a given service. Multiple instances of a service (ie:
tenants) can be hosted using the same hostname in the form
{issuer|tenant-identifier}/.well-known/{known-resource}. This way a proper
resource hierarchy can be maintained in the URI namespace and heterogeneous
services can be deployed under the same hostname.

Thanks in advance for you time.

Cheers,

Andres Torres

--0000000000005d4fa70570a92cdc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr">Regarding RFC =
8414 (Proposed Standard) Section=C2=A03.1.=C2=A0 Authorization Server Metad=
ata Request:<br><br><pre class=3D"m_1873966726919866542gmail-newpage" style=
=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before:page;=
color:rgb(0,0,0);text-decoration-style:initial;text-decoration-color:initia=
l">   If the issuer identifier value contains a path component, any
   terminating &quot;/&quot; MUST be removed before inserting &quot;/.well-=
known/&quot; and
   the well-known URI suffix between the host component and the path
   component.  The client would make the following request when the
   issuer identifier is &quot;<a href=3D"https://example.com/issuer1" targe=
t=3D"_blank">https://example.com/issuer1</a>&quot; and the well-known
   URI suffix is &quot;oauth-authorization-server&quot; to obtain the metad=
ata,
   since the issuer identifier contains a path component:

     GET /.well-known/oauth-<wbr>authorization-server/issuer1 HTTP/1.1
     Host: <a href=3D"http://example.com" target=3D"_blank">example.com</a>
</pre><br class=3D"m_1873966726919866542gmail-Apple-interchange-newline"><b=
r>In terms of API design the final result is confusing. The resource=C2=A0<=
font face=3D"monospace, monospace">/.well-known/oauth-<wbr>authorization-se=
rver</font> becomes a collection of resources where issuer is a subresource=
. However,=C2=A0<br><span style=3D"font-size:small;text-decoration-style:in=
itial;text-decoration-color:initial;float:none;display:inline"><font face=
=3D"monospace, monospace">/.well-known/oauth-<wbr>authorization-server</fon=
t> should be a subresource of the issuer/tenant. It is my understanding tha=
t=C2=A0<span style=3D"background-color:rgb(255,255,255);text-decoration-sty=
le:initial;text-decoration-color:initial;float:none;display:inline"><font f=
ace=3D"monospace, monospace">.well-known</font> is a prefix for known resou=
rces in a given service. Multiple instances of a service (ie: tenants) can =
be hosted using the same hostname in the form <font face=3D"monospace, mono=
space">{issuer|tenant-identifier}/.<wbr>well-known/{known-resource}</font>.=
 This way a proper resource hierarchy can be maintained in the URI namespac=
e and=C2=A0heterogeneous services can be deployed under the same hostname.<=
/span></span><div><br></div><div>Thanks in advance for you time.<br><div><b=
r>Cheers,<br><br></div><div>Andres Torres</div></div></div>
</div><br></div>

--0000000000005d4fa70570a92cdc--


From nobody Tue Jul 10 11:40:12 2018
Return-Path: <david@alkaline-solutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2199B1311AC for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 11:39:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jE2tFfvAQCq5 for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 11:39:54 -0700 (PDT)
Received: from alkaline-solutions.com (lithium5.alkaline-solutions.com [173.255.196.46]) by ietfa.amsl.com (Postfix) with ESMTP id D725F1311A2 for <oauth@ietf.org>; Tue, 10 Jul 2018 11:39:54 -0700 (PDT)
Received: from [IPv6:2601:282:202:b210:34dc:ce77:12b5:b66c] (unknown [IPv6:2601:282:202:b210:34dc:ce77:12b5:b66c]) by alkaline-solutions.com (Postfix) with ESMTPSA id 4F65731623; Tue, 10 Jul 2018 18:39:54 +0000 (UTC)
From: David Waite <david@alkaline-solutions.com>
Message-Id: <273B4B99-866D-4F6D-A2A8-3410B4ED2A3D@alkaline-solutions.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_CC80AE4F-C576-42BC-B7C2-034453A82F01"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 10 Jul 2018 12:39:53 -0600
In-Reply-To: <CAEdHPxrSNT0N4CiaDv+rzhh44m0g4zqUNwFq85tp6kMeVC7h-w@mail.gmail.com>
Cc: oauth@ietf.org
To: Andres Torres <janthoe@gmail.com>
References: <CAEdHPxrSNT0N4CiaDv+rzhh44m0g4zqUNwFq85tp6kMeVC7h-w@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/FXQCF5QYvCYBZKMtrPE5aOp5pVU>
Subject: Re: [OAUTH-WG] Mail regarding draft-ietf-oauth-discovery
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 18:40:10 -0000

--Apple-Mail=_CC80AE4F-C576-42BC-B7C2-034453A82F01
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On Jul 10, 2018, at 12:19 PM, Andres Torres <janthoe@gmail.com> wrote:

> In terms of API design the final result is confusing. The resource =
/.well-known/oauth-authorization-server becomes a collection of =
resources where issuer is a subresource.. However,=20
> /.well-known/oauth-authorization-server should be a subresource of the =
issuer/tenant. It is my understanding that .well-known is a prefix for =
known resources in a given service. Multiple instances of a service (ie: =
tenants) can be hosted using the same hostname in the form =
{issuer|tenant-identifier}/.well-known/{known-resource}. This way a =
proper resource hierarchy can be maintained in the URI namespace and =
heterogeneous services can be deployed under the same hostname.

This is/was actually how it was done within OpenID Connect. However, the =
only structured URL components allowed within IETF specifications are =
underneath a /.well-known root. Since a multi-tenant application may =
have a different issuer per tenant all within one origin, this =
transformation was created such that each can have their own metadata.

Another option would have been to have the issuer URL be the discovery =
URL, but this would require an issuer of https://example.com =
<https://example.com/> to modify the root of their service to respond to =
requests for metadata (such as in response to the requirements of an =
Accepts header).

A third option might be to define an =E2=80=98issuer=E2=80=99 parameter =
and behavior on the metadata endpoint, such that servers which host only =
one issuer could ignore it, but a server with multiple issuers could =
require and act on this parameter.

-DW=

--Apple-Mail=_CC80AE4F-C576-42BC-B7C2-034453A82F01
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Jul 10, 2018, at 12:19 PM, Andres Torres &lt;<a =
href=3D"mailto:janthoe@gmail.com" class=3D"">janthoe@gmail.com</a>&gt; =
wrote:</div></blockquote><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"">In terms of API design =
the final result is confusing. The resource&nbsp;<font face=3D"monospace, =
monospace" class=3D"">/.well-known/oauth-<wbr =
class=3D"">authorization-server</font> becomes a collection of resources =
where issuer is a subresource.. However,&nbsp;<br class=3D""><span =
style=3D"font-size:small;text-decoration-style:initial;text-decoration-col=
or:initial;float:none;display:inline" class=3D""><font face=3D"monospace, =
monospace" class=3D"">/.well-known/oauth-<wbr =
class=3D"">authorization-server</font> should be a subresource of the =
issuer/tenant. It is my understanding that&nbsp;<span =
style=3D"background-color:rgb(255,255,255);text-decoration-style:initial;t=
ext-decoration-color:initial;float:none;display:inline" class=3D""><font =
face=3D"monospace, monospace" class=3D"">.well-known</font> is a prefix =
for known resources in a given service. Multiple instances of a service =
(ie: tenants) can be hosted using the same hostname in the form <font =
face=3D"monospace, monospace" class=3D"">{issuer|tenant-identifier}/.<wbr =
class=3D"">well-known/{known-resource}</font>. This way a proper =
resource hierarchy can be maintained in the URI namespace =
and&nbsp;heterogeneous services can be deployed under the same =
hostname.</span></span></div></div></div></div></blockquote><div><br =
class=3D""></div>This is/was actually how it was done within OpenID =
Connect. However, the only structured URL components allowed within IETF =
specifications are underneath a /.well-known root. Since a multi-tenant =
application may have a different issuer per tenant all within one =
origin, this transformation was created such that each can have their =
own metadata.</div><div><br class=3D""></div><div>Another option would =
have been to have the issuer URL be the discovery URL, but this would =
require an issuer of <a href=3D"https://example.com" =
class=3D"">https://example.com</a>&nbsp;to modify the root of their =
service to respond to requests for metadata (such as in response to the =
requirements of an Accepts header).</div><div><br class=3D""></div><div>A =
third option might be to define an =E2=80=98issuer=E2=80=99 parameter =
and behavior on the metadata endpoint, such that servers which host only =
one issuer could ignore it, but a server with multiple issuers could =
require and act on this parameter.</div><div><br =
class=3D""></div><div>-DW</div></body></html>=

--Apple-Mail=_CC80AE4F-C576-42BC-B7C2-034453A82F01--


From nobody Tue Jul 10 12:55:14 2018
Return-Path: <janthoe@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1550C1311A3 for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 12:55:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yU2VhSmu0LUD for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 12:55:10 -0700 (PDT)
Received: from mail-oi0-x232.google.com (mail-oi0-x232.google.com [IPv6:2607:f8b0:4003:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 74D861310CD for <oauth@ietf.org>; Tue, 10 Jul 2018 12:55:10 -0700 (PDT)
Received: by mail-oi0-x232.google.com with SMTP id q11-v6so19399486oic.12 for <oauth@ietf.org>; Tue, 10 Jul 2018 12:55:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Hao9trAvwiGpPtuEKgQwREDOtBMhiFWSyh/G/Xz1kck=; b=B4dg2Ya9v9/V812k0sPGe9xScV39WSvdWM689kR8rHPUR74wMeY/ZSePgaGtQLK6B/ QO/Noz7DUDbTVC70LkGLocZq/be/AiBFqjVcAUYSBwwEJQbQd8J1N+85ySwRW/tC5tlv THPhCm+BLy3PX1hdZZTM1eJgDRNJ5JqF1bw+unM394WNbHs+LBh35DHhG4ZOHp+kKiaq Ik8KW9S88VoNr17lVloMazAdoUgQvVLRXc0XotRFvYsC2etZoZLs6R+eiYDOTQMx/PWk Dd+ciHJM7u/Zeysii9zTRsoaZ4J8TQGxFGaiKkA6z0ha/BV1dZOpTVXQQrBDCxfaBiwt 8GCw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Hao9trAvwiGpPtuEKgQwREDOtBMhiFWSyh/G/Xz1kck=; b=bgrFfpUgJWENwHPpdulJeITA4c1K7rnIX/x8UKrC0rG39mL3QiMgeQmB5yZPwh17c1 wq4CVJNRknk7d8incta22k120etGrw+nEbkVRxsJVG3bPXdT1CKsFJElHkU3RrhcNR8S MLmXw74J3Pofy4nxDrhuae8FkN7s9SNJYZ4bzPTOP5n6N0rGu0TmwJWVpMREmvpD2MfH tLbIh/FJrwHdJDst9n4Q3u2zb+OMDXjNmm9qthp+CHRjxJtZgzQSW7iZGFZu0BA+/Yeq uG2FpEOriXRfMNyZFIl8rQDGd7cUF7rGh1wxVknXweIWiYXtO546KhNGARijRgP90uYa bHrg==
X-Gm-Message-State: APt69E0wF17usrEJHcASQ7pxeA5lEhgSlAftAJLkEjrR8p/YDztEDhzD daSqtQqPoTMQVOxE5mHpbyJeeqZ60LfXPPkPjE0=
X-Google-Smtp-Source: AAOMgpfvZSaW56poKRyceexPZD/rfUaApzj1QX6Q0iei4BKlWDcpt4IPPxF0H+sH4HDm01de21Wr5J7WKWRaFY2716U=
X-Received: by 2002:aca:cf97:: with SMTP id f145-v6mr30423795oig.131.1531252509837;  Tue, 10 Jul 2018 12:55:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a9d:2369:0:0:0:0:0 with HTTP; Tue, 10 Jul 2018 12:54:49 -0700 (PDT)
In-Reply-To: <273B4B99-866D-4F6D-A2A8-3410B4ED2A3D@alkaline-solutions.com>
References: <CAEdHPxrSNT0N4CiaDv+rzhh44m0g4zqUNwFq85tp6kMeVC7h-w@mail.gmail.com> <273B4B99-866D-4F6D-A2A8-3410B4ED2A3D@alkaline-solutions.com>
From: Andres Torres <janthoe@gmail.com>
Date: Tue, 10 Jul 2018 15:54:49 -0400
Message-ID: <CAEdHPxpJej4A2S-_tnqMP1sj=ntbcETarrNMXRSGRce4tN8epQ@mail.gmail.com>
To: David Waite <david@alkaline-solutions.com>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000e90d800570aa81e4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Z5LYh9IT3r_UApQCROkNqDP1Wp4>
Subject: Re: [OAUTH-WG] Mail regarding draft-ietf-oauth-discovery
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2018 19:55:14 -0000

--000000000000e90d800570aa81e4
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

   If the issuer identifier value contains a path component, any
   terminating "/" MUST be removed before inserting "/.well-known/" and
   the well-known URI suffix between the host component and the path
   component.


Just as clarification then, this section does not require that path
components not related to the issuer should be removed from the URI:
ex:
https://example.com/{application-identifier}/.wellknown/oauth-authorization=
-server/{issuer}

Is that correct?

The language in this section suggests that the url path should start in
every case with /.well-known, which would not allow to have URIs like the
one in the example above, ie: {application-identifier} and
/.wellknown/oauth-authorization-server
should always be at the root of the host

~AT

On Tue, Jul 10, 2018 at 2:39 PM, David Waite <david@alkaline-solutions.com>
wrote:

>
>
> On Jul 10, 2018, at 12:19 PM, Andres Torres <janthoe@gmail.com> wrote:
>
>
> In terms of API design the final result is confusing. The resource
> /.well-known/oauth-authorization-server becomes a collection of resources
> where issuer is a subresource.. However,
> /.well-known/oauth-authorization-server should be a subresource of the
> issuer/tenant. It is my understanding that .well-known is a prefix for
> known resources in a given service. Multiple instances of a service (ie:
> tenants) can be hosted using the same hostname in the form
> {issuer|tenant-identifier}/.well-known/{known-resource}. This way a
> proper resource hierarchy can be maintained in the URI namespace
> and heterogeneous services can be deployed under the same hostname.
>
>
> This is/was actually how it was done within OpenID Connect. However, the
> only structured URL components allowed within IETF specifications are
> underneath a /.well-known root. Since a multi-tenant application may have=
 a
> different issuer per tenant all within one origin, this transformation wa=
s
> created such that each can have their own metadata.
>
> Another option would have been to have the issuer URL be the discovery
> URL, but this would require an issuer of https://example.com to modify
> the root of their service to respond to requests for metadata (such as in
> response to the requirements of an Accepts header).
>
> A third option might be to define an =E2=80=98issuer=E2=80=99 parameter a=
nd behavior on
> the metadata endpoint, such that servers which host only one issuer could
> ignore it, but a server with multiple issuers could require and act on th=
is
> parameter.
>
> -DW
>

--000000000000e90d800570aa81e4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><pre class=3D"gmail-m_-1826285930243390980m_18739667269198=
66542gmail-newpage" style=3D"white-space:pre-wrap;text-decoration-style:ini=
tial;text-decoration-color:initial;font-size:13.3333px;margin-top:0px;margi=
n-bottom:0px;break-before:page;color:rgb(0,0,0)">   If the issuer identifie=
r value contains a path component, any
   terminating &quot;/&quot; MUST be removed before inserting &quot;/.well-=
known/&quot; and
   the well-known URI suffix between the host component and the path
   component.</pre><br><div>Just as clarification then, this section does n=
ot require that path components not related to the issuer should be removed=
 from the URI:<br>ex: <font face=3D"monospace, monospace"><a href=3D"https:=
//example.com/{application-identifier}/.wellknown/oauth-authorization-serve=
r/{issuer}">https://example.com/{application-identifier}/.wellknown/oauth-a=
uthorization-server/{issuer}</a></font></div><div><font face=3D"monospace, =
monospace"><br></font></div><div><font face=3D"arial, helvetica, sans-serif=
">Is that correct?</font></div><div><font face=3D"monospace, monospace"><br=
></font></div><div><font face=3D"arial, helvetica, sans-serif">The language=
 in this section suggests that the url path should start in every case with=
=C2=A0</font><font face=3D"monospace, monospace">/.well-known</font><font f=
ace=3D"arial, helvetica, sans-serif">, which would not allow to have URIs l=
ike the one in the example above, ie: {<span style=3D"font-size:small;backg=
round-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-=
color:initial;float:none;display:inline"><font face=3D"monospace, monospace=
">application-identifier} </font>and<font face=3D"monospace, monospace">=C2=
=A0</font><span style=3D"text-decoration-style:initial;text-decoration-colo=
r:initial;float:none;display:inline"><font face=3D"monospace, monospace">/.=
wellknown/oauth-authorization-server </font>should always be at the root of=
 the host</span></span><br><br>~AT</font></div></div><div class=3D"gmail_ex=
tra"><br><div class=3D"gmail_quote">On Tue, Jul 10, 2018 at 2:39 PM, David =
Waite <span dir=3D"ltr">&lt;<a href=3D"mailto:david@alkaline-solutions.com"=
 target=3D"_blank">david@alkaline-solutions.com</a>&gt;</span> wrote:<br><b=
lockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px =
#ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word;line-break:=
after-white-space"><br><div><br><blockquote type=3D"cite"><div>On Jul 10, 2=
018, at 12:19 PM, Andres Torres &lt;<a href=3D"mailto:janthoe@gmail.com" ta=
rget=3D"_blank">janthoe@gmail.com</a>&gt; wrote:</div></blockquote><br><blo=
ckquote type=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_quote"><div=
 dir=3D"ltr">In terms of API design the final result is confusing. The reso=
urce=C2=A0<font face=3D"monospace, monospace">/.well-known/oauth-au<wbr>tho=
rization-server</font> becomes a collection of resources where issuer is a =
subresource.. However,=C2=A0<span class=3D""><br><span style=3D"font-size:s=
mall;text-decoration-style:initial;text-decoration-color:initial;float:none=
;display:inline"><font face=3D"monospace, monospace">/.well-known/oauth-aut=
horizati<wbr>on-server</font> should be a subresource of the issuer/tenant.=
 It is my understanding that=C2=A0<span style=3D"background-color:rgb(255,2=
55,255);text-decoration-style:initial;text-decoration-color:initial;float:n=
one;display:inline"><font face=3D"monospace, monospace">.well-known</font> =
is a prefix for known resources in a given service. Multiple instances of a=
 service (ie: tenants) can be hosted using the same hostname in the form <f=
ont face=3D"monospace, monospace">{issuer|tenant-identifier}/.we<wbr>ll-kno=
wn/{known-resource}</font>. This way a proper resource hierarchy can be mai=
ntained in the URI namespace and=C2=A0heterogeneous services can be deploye=
d under the same hostname.</span></span></span></div></div></div></div></bl=
ockquote><div><br></div>This is/was actually how it was done within OpenID =
Connect. However, the only structured URL components allowed within IETF sp=
ecifications are underneath a /.well-known root. Since a multi-tenant appli=
cation may have a different issuer per tenant all within one origin, this t=
ransformation was created such that each can have their own metadata.</div>=
<div><br></div><div>Another option would have been to have the issuer URL b=
e the discovery URL, but this would require an issuer of <a href=3D"https:/=
/example.com" target=3D"_blank">https://example.com</a>=C2=A0to modify the =
root of their service to respond to requests for metadata (such as in respo=
nse to the requirements of an Accepts header).</div><div><br></div><div>A t=
hird option might be to define an =E2=80=98issuer=E2=80=99 parameter and be=
havior on the metadata endpoint, such that servers which host only one issu=
er could ignore it, but a server with multiple issuers could require and ac=
t on this parameter.</div><span class=3D"HOEnZb"><font color=3D"#888888"><d=
iv><br></div><div>-DW</div></font></span></div></blockquote></div><br></div=
>

--000000000000e90d800570aa81e4--


From nobody Tue Jul 10 23:39:14 2018
Return-Path: <t.broyer@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB129130E04 for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 23:39:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x3zoX-iZobhE for <oauth@ietfa.amsl.com>; Tue, 10 Jul 2018 23:39:10 -0700 (PDT)
Received: from mail-oi0-x22c.google.com (mail-oi0-x22c.google.com [IPv6:2607:f8b0:4003:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14994130E0E for <oauth@ietf.org>; Tue, 10 Jul 2018 23:39:10 -0700 (PDT)
Received: by mail-oi0-x22c.google.com with SMTP id l10-v6so564596oii.0 for <oauth@ietf.org>; Tue, 10 Jul 2018 23:39:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pbqNuvvM6CunAEI3WmvZ9GcOFD6XQ6HShRjrlCgHzyc=; b=HfK9J5lByhtt22DbA/Lbq2K0UK+heekPUjONe+1Q0bVw91Y1NEPSFn3Tr5edegIxbz LDN+N5Xg39sLSwYe1WLfajdSAjXxKzg8RfIuz9vcQLjKr3GNARD8Y6nCTqlZD9OT+y7T Dv++L+vUiHLFkJIgRVjFCYSiTeIJEBHg25DB2/BwtCeF3dKnUS+U7WVIIn9RuXNlmY98 NKXcEwLSZ2fMdh4LqXGZaFdGRI6arT+nUDBzajgQc5LJKznk2rk1/g+w4PFrVfIbwvSn 6OZVcUZqCli7SkRvZ+zdo7aB025OT1htkpP9NeFll0LlZO9fmZI1DWmR0ifQ0BPkBJ2n uk7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pbqNuvvM6CunAEI3WmvZ9GcOFD6XQ6HShRjrlCgHzyc=; b=tVYoV4f1e3ULoLy7aQQBadf64Nm8yS3z1iES0XAE7NtUcLvfJ64ncIycPQhlhw0KDj mHOtfgSxfhdRC5TPfjVUiO2R/THY6qV3qKPiq5TbWtnI0TbNQqC9IU7l14a6ex+HEpcD r7/1XCo0ooG+wz+DZ4k8t13Kou++yQ3lGXkWS3e6XhyNND78wQTkQyHw0TTGjugnj+eI O+LhNHWEm6Op2GvZtX/4j+oTFMHT29czkyxJZyXbxKpaSretAPzO2eFCBd4Au9zykPXE w+jTsLQFK31ui9KPIXDi9mI9u1ipyzVp0E6TehHjeMetE3m9r4PPb+kAFlweNJpswW+H b9Hg==
X-Gm-Message-State: APt69E0BSRHDZheI2RcpJZ1qT1J57mRb4+6756yVpt5Rsbm0+FBJAY4J n+b8eIfsjKar7g3G1Gj0iePL8cadRmceGHkUu0M=
X-Google-Smtp-Source: AAOMgpdE+3jcChZcOEXv5IjasQiYksjEDtTBE0bfbDGk08jCWAv5zLzmFXExtF3Gl2J7lbUUv2XwygbJuCsDCsZhq4A=
X-Received: by 2002:aca:acc8:: with SMTP id v191-v6mr28355138oie.354.1531291149198;  Tue, 10 Jul 2018 23:39:09 -0700 (PDT)
MIME-Version: 1.0
References: <CAEdHPxrSNT0N4CiaDv+rzhh44m0g4zqUNwFq85tp6kMeVC7h-w@mail.gmail.com> <273B4B99-866D-4F6D-A2A8-3410B4ED2A3D@alkaline-solutions.com> <CAEdHPxpJej4A2S-_tnqMP1sj=ntbcETarrNMXRSGRce4tN8epQ@mail.gmail.com>
In-Reply-To: <CAEdHPxpJej4A2S-_tnqMP1sj=ntbcETarrNMXRSGRce4tN8epQ@mail.gmail.com>
From: Thomas Broyer <t.broyer@gmail.com>
Date: Wed, 11 Jul 2018 08:38:56 +0200
Message-ID: <CAEayHEMh9pJ4Ah_FdRBEZDqwxy=cgGca5e1GfLwAf9RKTMauQA@mail.gmail.com>
To: Andres Torres <janthoe@gmail.com>
Cc: David Waite <david@alkaline-solutions.com>, oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000feeaa80570b38029"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/tgLYdEImkev80Wq14YIhXI0INs4>
Subject: Re: [OAUTH-WG] Mail regarding draft-ietf-oauth-discovery
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jul 2018 06:39:13 -0000

--000000000000feeaa80570b38029
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Le mar. 10 juil. 2018 21:55, Andres Torres <janthoe@gmail.com> a =C3=A9crit=
 :

>    If the issuer identifier value contains a path component, any
>    terminating "/" MUST be removed before inserting "/.well-known/" and
>    the well-known URI suffix between the host component and the path
>    component.
>
>
> Just as clarification then, this section does not require that path
> components not related to the issuer should be removed from the URI:
> ex:
> https://example.com/{application-identifier}/.wellknown/oauth-authorizati=
on-server/{issuer}
>
> Is that correct?
>
> The language in this section suggests that the url path should start in
> every case with /.well-known, which would not allow to have URIs like the
> one in the example above, ie: {application-identifier} and /.wellknown/oa=
uth-authorization-server
> should always be at the root of the host
>


This is how it is defined in https://tools.ietf.org/html/rfc5785



>
> ~AT
>
> On Tue, Jul 10, 2018 at 2:39 PM, David Waite <david@alkaline-solutions.co=
m
> > wrote:
>
>>
>>
>> On Jul 10, 2018, at 12:19 PM, Andres Torres <janthoe@gmail.com> wrote:
>>
>>
>> In terms of API design the final result is confusing. The resource
>> /.well-known/oauth-authorization-server becomes a collection of
>> resources where issuer is a subresource.. However,
>> /.well-known/oauth-authorization-server should be a subresource of the
>> issuer/tenant. It is my understanding that .well-known is a prefix for
>> known resources in a given service. Multiple instances of a service (ie:
>> tenants) can be hosted using the same hostname in the form
>> {issuer|tenant-identifier}/.well-known/{known-resource}. This way a
>> proper resource hierarchy can be maintained in the URI namespace
>> and heterogeneous services can be deployed under the same hostname.
>>
>>
>> This is/was actually how it was done within OpenID Connect. However, the
>> only structured URL components allowed within IETF specifications are
>> underneath a /.well-known root. Since a multi-tenant application may hav=
e a
>> different issuer per tenant all within one origin, this transformation w=
as
>> created such that each can have their own metadata.
>>
>> Another option would have been to have the issuer URL be the discovery
>> URL, but this would require an issuer of https://example.com to modify
>> the root of their service to respond to requests for metadata (such as i=
n
>> response to the requirements of an Accepts header).
>>
>> A third option might be to define an =E2=80=98issuer=E2=80=99 parameter =
and behavior on
>> the metadata endpoint, such that servers which host only one issuer coul=
d
>> ignore it, but a server with multiple issuers could require and act on t=
his
>> parameter.
>>
>> -DW
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000000000000feeaa80570b38029
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote"><div dir=3D"ltr">Le mar. 10 juil. 2018 2=
1:55, Andres Torres &lt;<a href=3D"mailto:janthoe@gmail.com">janthoe@gmail.=
com</a>&gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><di=
v dir=3D"ltr"><pre class=3D"m_-5850954869380884821gmail-m_-1826285930243390=
980m_1873966726919866542gmail-newpage" style=3D"white-space:pre-wrap;text-d=
ecoration-style:initial;text-decoration-color:initial;font-size:13.3333px;m=
argin-top:0px;margin-bottom:0px;break-before:page;color:rgb(0,0,0)">   If t=
he issuer identifier value contains a path component, any
   terminating &quot;/&quot; MUST be removed before inserting &quot;/.well-=
known/&quot; and
   the well-known URI suffix between the host component and the path
   component.</pre><br></div><div dir=3D"ltr"><div>Just as clarification th=
en, this section does not require that path components not related to the i=
ssuer should be removed from the URI:<br>ex: <font face=3D"monospace, monos=
pace"><a href=3D"https://example.com/%7Bapplication-identifier%7D/.wellknow=
n/oauth-authorization-server/%7Bissuer%7D" target=3D"_blank">https://exampl=
e.com/{application-identifier}/.wellknown/oauth-authorization-server/{issue=
r}</a></font></div><div><font face=3D"monospace, monospace"><br></font></di=
v><div><font face=3D"arial, helvetica, sans-serif">Is that correct?</font><=
/div><div><font face=3D"monospace, monospace"><br></font></div><div><font f=
ace=3D"arial, helvetica, sans-serif">The language in this section suggests =
that the url path should start in every case with=C2=A0</font><font face=3D=
"monospace, monospace">/.well-known</font><font face=3D"arial, helvetica, s=
ans-serif">, which would not allow to have URIs like the one in the example=
 above, ie: {<span style=3D"font-size:small;background-color:rgb(255,255,25=
5);text-decoration-style:initial;text-decoration-color:initial;float:none;d=
isplay:inline"><font face=3D"monospace, monospace">application-identifier} =
</font>and<font face=3D"monospace, monospace">=C2=A0</font><span style=3D"t=
ext-decoration-style:initial;text-decoration-color:initial;float:none;displ=
ay:inline"><font face=3D"monospace, monospace">/.wellknown/oauth-authorizat=
ion-server </font>should always be at the root of the host</span></span></f=
ont></div></div><div dir=3D"ltr"><div><font face=3D"arial, helvetica, sans-=
serif"></font></div></div></blockquote></div><div><br></div><div><br></div>=
<div>This is how it is defined in=C2=A0<a href=3D"https://tools.ietf.org/ht=
ml/rfc5785">https://tools.ietf.org/html/rfc5785</a></div><div><br></div><di=
v><br></div><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
dir=3D"ltr"><div><font face=3D"arial, helvetica, sans-serif"><br><br>~AT</f=
ont></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">O=
n Tue, Jul 10, 2018 at 2:39 PM, David Waite <span dir=3D"ltr">&lt;<a href=
=3D"mailto:david@alkaline-solutions.com" target=3D"_blank">david@alkaline-s=
olutions.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div s=
tyle=3D"word-wrap:break-word;line-break:after-white-space"><br><div><br><bl=
ockquote type=3D"cite"><div>On Jul 10, 2018, at 12:19 PM, Andres Torres &lt=
;<a href=3D"mailto:janthoe@gmail.com" target=3D"_blank">janthoe@gmail.com</=
a>&gt; wrote:</div></blockquote><br><blockquote type=3D"cite"><div><div dir=
=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr">In terms of API design=
 the final result is confusing. The resource=C2=A0<font face=3D"monospace, =
monospace">/.well-known/oauth-authorization-server</font> becomes a collect=
ion of resources where issuer is a subresource.. However,=C2=A0<span><br><s=
pan style=3D"font-size:small;text-decoration-style:initial;text-decoration-=
color:initial;float:none;display:inline"><font face=3D"monospace, monospace=
">/.well-known/oauth-authorization-server</font> should be a subresource of=
 the issuer/tenant. It is my understanding that=C2=A0<span style=3D"backgro=
und-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-co=
lor:initial;float:none;display:inline"><font face=3D"monospace, monospace">=
.well-known</font> is a prefix for known resources in a given service. Mult=
iple instances of a service (ie: tenants) can be hosted using the same host=
name in the form <font face=3D"monospace, monospace">{issuer|tenant-identif=
ier}/.well-known/{known-resource}</font>. This way a proper resource hierar=
chy can be maintained in the URI namespace and=C2=A0heterogeneous services =
can be deployed under the same hostname.</span></span></span></div></div></=
div></div></blockquote><div><br></div>This is/was actually how it was done =
within OpenID Connect. However, the only structured URL components allowed =
within IETF specifications are underneath a /.well-known root. Since a mult=
i-tenant application may have a different issuer per tenant all within one =
origin, this transformation was created such that each can have their own m=
etadata.</div><div><br></div><div>Another option would have been to have th=
e issuer URL be the discovery URL, but this would require an issuer of <a h=
ref=3D"https://example.com" target=3D"_blank">https://example.com</a>=C2=A0=
to modify the root of their service to respond to requests for metadata (su=
ch as in response to the requirements of an Accepts header).</div><div><br>=
</div><div>A third option might be to define an =E2=80=98issuer=E2=80=99 pa=
rameter and behavior on the metadata endpoint, such that servers which host=
 only one issuer could ignore it, but a server with multiple issuers could =
require and act on this parameter.</div><span class=3D"m_-58509548693808848=
21HOEnZb"><font color=3D"#888888"><div><br></div><div>-DW</div></font></spa=
n></div></blockquote></div><br></div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div>

--000000000000feeaa80570b38029--


From nobody Thu Jul 12 06:47:49 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C6810130E2C for <oauth@ietfa.amsl.com>; Thu, 12 Jul 2018 06:47:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L8DN1wZ0nNCV for <oauth@ietfa.amsl.com>; Thu, 12 Jul 2018 06:47:44 -0700 (PDT)
Received: from mail-ua0-x22d.google.com (mail-ua0-x22d.google.com [IPv6:2607:f8b0:400c:c08::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A635012785F for <oauth@ietf.org>; Thu, 12 Jul 2018 06:47:43 -0700 (PDT)
Received: by mail-ua0-x22d.google.com with SMTP id p22-v6so7872769uao.7 for <oauth@ietf.org>; Thu, 12 Jul 2018 06:47:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=4W9eAfB9PPDh9QhbzCy4bJA+o5ZoqpmoHE6krfaliPg=; b=I2IMhjXzf+RmsVq9E9tm/tGpRFgGT9QARFi3iB2IYW9DDgtieA0uepG4IOfRD0LF83 Ao27UIQUHVaRdUyEJDhr6P4S1Q6uiL7WucOdLHfW5QR+sbujvOcDGtb27eWhelWOeNir yciIgwzLGblcL8WNfPtHZ9t5MO5geG50JSkCJeG44EI+lHZUGbbWo2FFgkr5pMadl3Np DaUkxDfxnXfkdlJzCFnR+roIgWBI4IxburH64goP2IQ6wIt3LuFv2yiy1uB0iTuA6qKX K9KWxMrZEiOMcspkJHuEv80uQca8d7n9rfAsMkosmafdCFVi6XEasu0sfybl0UYo6P7Z CSoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=4W9eAfB9PPDh9QhbzCy4bJA+o5ZoqpmoHE6krfaliPg=; b=OeEb1GAQLmNTYrvOMPCVJppVfWfbXRaahT9vZrFwGdCoKaX2etaYrtyjqo1fJbQsFv Njk/RZLuRpGsofXInp4/jDCOtoxrj01UVA3N3ka7TOQ666yihd6VRXCFPcUVo3GbScZ8 e0GZjMrRnLCvqijFJ8C3ig+YlivZNpmNA52+jzJag3fz/nMtwzWpgMLDh2KxEo6+EXlo h7R4VCZHixcTsOu7cS1qweuf/a8ltgX+eFiAgiry48icURRO0PaE8W4FC6bApFHQvfji anFBCNRP6Ug96wVP9qxLN9XD5KCK/GzXt9rZRmRqVAjO1v1rvassZv0NivlLt2rBI7Yq 7P1g==
X-Gm-Message-State: AOUpUlGDd3RyJ+Y2cfqX9moSONaH97T1cOTk9mliOu+hvmyq3P0HgFN1 7LJbEDVZ1xO9mZoko/Xc62/pGqN98tfTtFIYmtoIacRf
X-Google-Smtp-Source: AAOMgpcTtg9Iw+JwYKP6ddMgJDXpLiVzGmSkLoLpIEtAIvBMcaLr4aBAe3btK0nAe28/KmKW2NTTCGgs06nSbXIbtzA=
X-Received: by 2002:ab0:51e7:: with SMTP id h36-v6mr1449562uaa.70.1531403262546;  Thu, 12 Jul 2018 06:47:42 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 12 Jul 2018 09:48:13 -0400
Message-ID: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000078d6100570cd9b52"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/arcMfQUiQaG6s5D_5BJpgNYeIC8>
Subject: [OAUTH-WG] OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jul 2018 13:47:47 -0000

--00000000000078d6100570cd9b52
Content-Type: text/plain; charset="UTF-8"

All,

The following is our agenda for the two sessions next week:
https://datatracker.ietf.org/doc/agenda-102-oauth/


Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization (20 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/

* Reciprocal OAuth (30 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/

* OAuth 2.0 Token Binding (25 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/

  Short update on the following:
  https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
  https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/


** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
  https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08

* Distributed OAuth (30 min)
  https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/



Regards,
 Rifaat & Hannes

--00000000000078d6100570cd9b52
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><font face=3D"monospace, monospace">All,</font></div>=
<div><font face=3D"monospace, monospace"><br></font></div><div><font face=
=3D"monospace, monospace">The following is our agenda for the two sessions =
next week:<br></font></div><div><font face=3D"monospace, monospace"><a href=
=3D"https://datatracker.ietf.org/doc/agenda-102-oauth/">https://datatracker=
.ietf.org/doc/agenda-102-oauth/</a><br></font></div><div><font face=3D"mono=
space, monospace"><br></font></div><div><font face=3D"monospace, monospace"=
><br></font></div><div><font face=3D"monospace, monospace">

<pre style=3D"box-sizing:border-box;overflow:auto;font-family:&quot;PT Mono=
&quot;,Monaco,monospace;font-size:14px;display:block;padding:10px;margin:0p=
x 0px 10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-w=
rap:break-word;background-color:rgb(255,253,245);border:1px solid rgb(204,2=
04,204);border-radius:4px;text-decoration-style:initial;text-decoration-col=
or:initial">Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-=
authz/">https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz=
/</a>

* Reciprocal OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/"=
>https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/</a>

* OAuth 2.0 Token Binding (25 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-bindin=
g/">https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/</a>
 =20
  Short update on the following:
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/">https=
://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a>
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchan=
ge/">https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/</a>


** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distrib=
ution
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribut=
ion-03">https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-0=
3</a>

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-=
08">https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08</a>

* Distributed OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed=
/">https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/</a></pre=
>

<br></font></div><div><font face=3D"monospace, monospace"><br></font></div>=
<div><font face=3D"monospace, monospace">Regards,</font></div><div><font fa=
ce=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</font></div><div><br>=
</div></div>

--00000000000078d6100570cd9b52--


From nobody Thu Jul 12 09:54:11 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E80E4131132 for <oauth@ietfa.amsl.com>; Thu, 12 Jul 2018 09:54:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gtQ2-J26gLMr for <oauth@ietfa.amsl.com>; Thu, 12 Jul 2018 09:54:06 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-dm3nam06on070e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe56::70e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 636C9130F29 for <oauth@ietf.org>; Thu, 12 Jul 2018 09:54:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=I6jLuXxRM0DJIhriPlY78PX/DErmktOmINm5jHUvAAs=; b=W1vGtvzgWtW42K3Y2Fh+qjYDXi92UTNB7D8MEs3NNfxd1BH0iJg/i5krXcQK5pS9GMMI9odjbZN1yrO/8Ic8h0jUVNXwrK7qbpHdkU9NbgaMWOTXbcFVssHOAgGBji8morzNE/I9kOwh4p4TyOR36NHY8HCF5sShqhnTuIjn6uY=
Received: from BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) by BL0PR00MB0356.namprd00.prod.outlook.com (52.132.20.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.968.0; Thu, 12 Jul 2018 16:54:05 +0000
Received: from BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::9c03:3a8d:fe8f:db5]) by BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::9c03:3a8d:fe8f:db5%3]) with mapi id 15.20.0994.000; Thu, 12 Jul 2018 16:54:05 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] OAuth WG Final Agenda
Thread-Index: AQHUGeb3p4RKt7zsgE+TKzeL8oc6HaSLzeFw
Date: Thu, 12 Jul 2018 16:54:04 +0000
Message-ID: <BL0PR00MB02923AE01EFD11206587495EF5590@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com>
In-Reply-To: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.47.80.188]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR00MB0356; 6:wO9tmqGGY+XzV/7dc+6m2weYZFnh35rEzKFUcVCLQBATDOuxc4glCE2TpUoxPnM6zREQ1fscQi46f+we6dfxGxLXuzikL/DkVxmvH7kq4lVqsCVNwpn5QMmBqpJibdg2F+v2sAIyM/HgnppkY2FfpREoEqSeyPTidPGbQpMZuD+QesWjjkEs552kmTe9B/xCTOByWVM5rXS9M/yE9x0fMZcVWBeF/RMzvy8Ys2sQYBJTF3BaeEt7iP3UtntfzHP9xuiU9HufAxXHw6/s8KHMkASf/TLXTr4eVtjaYui08A/2vCHzC3XWrsU9b4Cj2mCGjJOFMgWD66WSlM9NfzBxYJjctk3/EI22iiSoMC710VkJ/Ol+eDxMtWhiUup5nTsFrqmCXX8NogaCdaUp0fOcm/Hj77VlF4QtR4WIrr23fJtysDw17SVOPgavwte6xko8tQaTeAA/bicuggQtjIvWYg==; 5:LqmuVBiHYmZOFCrchCCt1wHK4gBmEmbIGyGxDkSBKufT+Ubm2vTGlSv8uv3pLnwgUTs8bAfle+Am8mNf0hb033AbZ7eNrO0at7B9s5gdG1VmF6ojKfE2523gZAQW0YFBz3cFjdN07VGmOx43U8yAsX7M8BazZoHyciTpxkFIiFk=; 7:1aiUlWc1xAmOu76xspbWkbj4rErJzKnOkBqK2S0Tyj9DMIg0xvqprBWj0MXM499t8GlfnxLd5FzVXoi3lrPHmipizMq2EI0tGPD4oj5GpvScsIfj7nZTfqpZKBJPwM8tJZ889Kih4Y6Z2YW4a3BTIzsZoLWG9fyIaMWFeUA/Xo9V5Xzun16R/d5LsNHQerEK6pTQmSdV+ZRl0aJVFeh26TW4U12nSqhbWPXUI+XdK3JfE3RmGB/54fRQw6nCa2Ih
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 42f9f725-a94e-4abc-76e1-08d5e81813c0
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:BL0PR00MB0356; 
x-ms-traffictypediagnostic: BL0PR00MB0356:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <BL0PR00MB035654EBCB7EC0EA4D1A7DEDF5590@BL0PR00MB0356.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(120809045254105)(192374486261705)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3231311)(944501410)(52105095)(2018427008)(3002001)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:BL0PR00MB0356; BCL:0; PCL:0; RULEID:; SRVR:BL0PR00MB0356; 
x-forefront-prvs: 0731AA2DE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(346002)(376002)(366004)(136003)(396003)(199004)(189003)(105586002)(81166006)(6506007)(14454004)(5660300001)(102836004)(97736004)(68736007)(106356001)(81156014)(26005)(486006)(53546011)(86362001)(66066001)(86612001)(8936002)(6246003)(2900100001)(2906002)(53936002)(33656002)(8676002)(14444005)(8990500004)(7736002)(74316002)(446003)(76176011)(7696005)(186003)(229853002)(316002)(99286004)(11346002)(19609705001)(22452003)(476003)(256004)(6436002)(25786009)(3846002)(6116002)(9686003)(966005)(55016002)(5250100002)(54896002)(6306002)(236005)(10290500003)(110136005)(790700001)(10090500001)(72206003)(39060400002)(606006)(478600001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR00MB0356; H:BL0PR00MB0292.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: XcfVjysWw4Kv3U5Qtk9pN6D04o8nQ2RM/CQLF+DtLyK3gSZ3k+nSyCoULPL+6D7xKagNmZGb9nW2PDLjMjQUG9Zw89h7yOgSVQ5uUhHx5OeLe2HQlp9qZkZlRIlbyK5ZUYrnOSRB11eAFfmnn1x+fSU2JkHnkJkrvd+KpgEOQIAd5qNbdmJtsyGNZDPog4x+DIRg+lH4m7vPvqRjfRlvbedvwrFQWsYshR6u6PUSJTQvbTNmtzCAoUCoIziYaDTuVnz5dHzqd3AfBehq20V1pGCivY/OaKxkhTZK98zZ0IlhFVYrx0nRE6EBKNZQPNWkxbKvgWIkr2VMLULazM7kJEtUZiryQfdpVDVDo9NiRZ8=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB02923AE01EFD11206587495EF5590BL0PR00MB0292namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42f9f725-a94e-4abc-76e1-08d5e81813c0
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jul 2018 16:54:04.8761 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR00MB0356
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/No715xpTz5HVY__uunXCTxHVr4g>
Subject: Re: [OAUTH-WG] OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jul 2018 16:54:10 -0000

--_000_BL0PR00MB02923AE01EFD11206587495EF5590BL0PR00MB0292namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BL0PR00MB02923AE01EFD11206587495EF5590BL0PR00MB0292namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BL0PR00MB02923AE01EFD11206587495EF5590BL0PR00MB0292namp_--


From nobody Fri Jul 13 18:29:59 2018
Return-Path: <jricher@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00E18130F62 for <oauth@ietfa.amsl.com>; Fri, 13 Jul 2018 18:29:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tCTnPrlI9OZM for <oauth@ietfa.amsl.com>; Fri, 13 Jul 2018 18:29:55 -0700 (PDT)
Received: from dmz-mailsec-scanner-1.mit.edu (dmz-mailsec-scanner-1.mit.edu [18.9.25.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BCB2A12426A for <oauth@ietf.org>; Fri, 13 Jul 2018 18:29:55 -0700 (PDT)
X-AuditID: 1209190c-ac1ff70000004476-7e-5b495212f61c
Received: from mailhub-auth-3.mit.edu ( [18.9.21.43]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-1.mit.edu (Symantec Messaging Gateway) with SMTP id D3.CB.17526.212594B5; Fri, 13 Jul 2018 21:29:54 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-3.mit.edu (8.13.8/8.9.2) with ESMTP id w6E1TqIe019814; Fri, 13 Jul 2018 21:29:53 -0400
Received: from [192.168.1.4] (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w6E1TomQ001862 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 13 Jul 2018 21:29:51 -0400
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.4 \(3445.8.2\))
From: Justin Richer <jricher@mit.edu>
In-Reply-To: <MW2PR00MB0298594ADC1B2904CC48D881F5400@MW2PR00MB0298.namprd00.prod.outlook.com>
Date: Fri, 13 Jul 2018 21:29:49 -0400
Cc: Ludwig Seitz <ludwig.seitz@ri.se>, "<oauth@ietf.org>" <oauth@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <6E1C9B75-A00E-4FE0-AFE5-EBF687FA67BC@mit.edu>
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <58eac9f9-21a6-aa6d-ac28-6fce70cfa08e@ri.se> <MW2PR00MB0298594ADC1B2904CC48D881F5400@MW2PR00MB0298.namprd00.prod.outlook.com>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3445.8.2)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpkleLIzCtJLcpLzFFi42IR4hTV1hUK8ow2aNqhYvHq83RWi4Yvq5ks Tr59xebA7HFi2RVWjyVLfjJ5LG3azBTAHMVlk5Kak1mWWqRvl8CVMenhS6aCKZIVV/7tZmpg vCfSxcjJISFgIjHv2STmLkYuDiGBxUwSi+cvYwZJCAlsZJTYtSQVInGNSaJlwllGkASzgKbE /u7lLF2MHBy8AsYS6y+Wg4SFBXQkHm28zwJiswmoSkxf08IEYnMKxEpsfbSWHcRmAYqvfb2T BWKMl8S89utQI7Ulli18DbaXV8BKYuWke+wQex8xSizecwusWUTAVuL3ob0sEFcrSiza2MA6 gVFgFpKTZiGcNAvJ2AWMzKsYZVNyq3RzEzNzilOTdYuTE/PyUot0DfVyM0v0UlNKNzGCQ1eS ZwfjmTdehxgFOBiVeHg3rPaIFmJNLCuuzD3EKMnBpCTKe87VM1qILyk/pTIjsTgjvqg0J7X4 EKMEB7OSCO8SU6Acb0piZVVqUT5MSpqDRUmcN3sRY7SQQHpiSWp2ampBahFMVoaDQ0mC1zgQ qFGwKDU9tSItM6cEIc3EwQkynAdo+IYAkOHFBYm5xZnpEPlTjLocf95PncQsxJKXn5cqJc77 DqRIAKQoozQPbg4o5bivs7N4xSgO9JYwrwfIOh5guoKb9ApoCRPQkrgUN5AlJYkIKakGRnWN yfPOtOptVN+47r9Uk9x+1XULOL78UWDPPb3unfX0C38/bMn7JOn7h/3wU7281X/ORepWnPXg kz6Yc3Pr5PyVD7kv9bY/r8rh/l+m1BR7JzR0VYLDBovn/yVypokIyX6d/GhfbhGbQ2rwBc8r DUlf1l2axfHmfcDu3BNMNf6aFVI5+QWPkpRYijMSDbWYi4oTAasr6AkUAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/CrK-yCC_7fs7sQriAlotZ8STPLg>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jul 2018 01:29:58 -0000

I don=E2=80=99t believe that this is a useful spec without meaningful =
key presentation mechanisms.=20

 =E2=80=94 Justin

> On Jul 5, 2018, at 11:04 AM, Mike Jones =
<Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:
>=20
> I'm fine putting some bandwidth into finishing OAuth PoP Key =
Distribution - particularly now that OAuth AS Metadata is finally done.  =
I know that Hannes is willing to do so as well.
>=20
> 				-- Mike
>=20
> -----Original Message-----
> From: OAuth <oauth-bounces@ietf.org> On Behalf Of Ludwig Seitz
> Sent: Tuesday, July 3, 2018 11:56 PM
> To: oauth@ietf.org
> Subject: Re: [OAUTH-WG] PoP Key Distribution
>=20
> On 2018-07-03 21:46, Hannes Tschofenig wrote:
>> Hi all,
>>=20
> .....
>> Where should the parameters needed for PoP key distribution should be=20=

>> defined? Currently, they are defined in two places -- in
>> https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-13 and also in=20=

>> https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03.=20=

>> In particular, the audience and the token_type parameters are defined=20=

>> in both specs.
>>=20
>> IMHO it appears that OAuth would be the best place to define the=20
>> HTTP-based parameters. ACE could define the IoT-based protocols, such=20=

>> as CoAP, MQTT, and alike. Of course, this is subject for discussion,=20=

>> particularly if there is no interest in doing so in the OAuth working=20=

>> group.
>>=20
>=20
> I fully agree that OAuth would be the best place. I've only drawn some =
of these parameters into draft-ietf-ace-oauth-authz because the work on =
draft-ietf-oauth-pop-key-distribution seemed to have been discontinued =
(it expired August 2017).
> That said, I'd hate to introduce a normative dependency into =
draft-ietf-ace-oauth-authz on a document that will not move forward or =
only move very slowly. What are the prospects of going forward quickly =
with draft-ietf-oauth-pop-key-distribution?
>=20
>> There is also a misalignment in terms of the content..=20
>> draft-ietf-oauth-pop-key-distribution defined an 'alg' parameter,=20
>> which does not exist in the draft-ietf-ace-oauth-authz document. The=20=

>> draft-ietf-ace-oauth-authz document does, however, have a profile=20
>> parameter, which does not exist in=20
>> draft-ietf-oauth-pop-key-distribution. Some alignment is therefore=20
>> needed. In the meanwhile the work on OAuth meta has been finalized =
and
>=20
> It seems indeed that 'alg' and 'profile' parameters have some overlap, =
although 'alg' seemed a bit more narrow to me (which is why I created =
'profile').  If we could extend the definition of 'alg' a bit, I'd be OK =
to remove 'profile' from the ACE draft (provided the OAuth draft moves =
forward in a timely manner).
>=20
>=20
> /Ludwig
>=20
> --
> Ludwig Seitz, PhD
> Security Lab, RISE SICS
> Phone +46(0)70-349 92 51
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From nobody Sat Jul 14 05:09:06 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 619041294D0 for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 05:09:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3ji_gKEmsTTy for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 05:09:03 -0700 (PDT)
Received: from mail-vk0-x22b.google.com (mail-vk0-x22b.google.com [IPv6:2607:f8b0:400c:c05::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C84C126DBF for <oauth@ietf.org>; Sat, 14 Jul 2018 05:09:03 -0700 (PDT)
Received: by mail-vk0-x22b.google.com with SMTP id o202-v6so19515033vko.2 for <oauth@ietf.org>; Sat, 14 Jul 2018 05:09:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ACT1l4Awa35wJBEVZnJKaP7NhgHZfIrHvnENmK7Xs7s=; b=ClX2uQ8gCgC4IkbgwtHV1fINjnGOmRFMHVbJTUCkYEExSZGBojwklpL7bFHXwRClIO ze8+wCjJGqgxCPzUg4PuchNMvB2sbzJf/3o++MIil1K+wvznlWWWPKsGXOYmhxdLEk7w pWtgdvqykPAiT/X8tC7UXBa4CIMPSnE1O83XY3Wi8Se4BZhIqS/23qKJZvYrxOMGpKlD +wYekezb93/gAIdpcTD883Gu7bM4N7AR05WIV4DjsZsv2WTSrLRiw52hPZ99dvQbZ8Hv MrsiKNoGUebFE4fUHOFWfOHSmGxUwJMrWWcA8OBucDy/sPSveAyzdlg7mzpnw8rU/SB0 acWw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ACT1l4Awa35wJBEVZnJKaP7NhgHZfIrHvnENmK7Xs7s=; b=T+elTBq/Xes780YHnPO0WFENPzQ8jKobxDvWF+H1dC7pT5JFhw8ffDXo477qERbUXi Ns0gupWVVCqhF6mj6GT5LrupB7TEoPe6+GzWPgIS1OiyWLoaRbzcCCqYRmn1gcegjTUu MxLufcIu6NC6HfxT6+pNFBoY4XeAH8gA11B/lDvNNLnizXzzHquRBD7+zTLwabU5sEyb vb4abli8m53CbymrPZk+WT1rhgnW/GpKJyaCWVWfdFsvAoQQtltI9q/DmbpK5wpfzVLh CcLmpsXEua84pmxz3kjBotu+8QDCzqIick7ntqhcJtg9T2kgIsz/SHLFhUSxUE94vKrc Klpg==
X-Gm-Message-State: AOUpUlEh6ZEOWd9I9xEsQ3ueLrVQBeUIXxaoqhQT7ax2mnqOSAdsVirP YVR/d4Juq77EQH/J82wi5l30zJ9A2oEHAksCZ8balA==
X-Google-Smtp-Source: AAOMgpcw3mlZpLYJqFIC2YwBQHej05HuP7vwSNN5xekjmRAZ2frcquSdzJevViWD2bB29HI8A1eX1FAJoi95hsQmD1s=
X-Received: by 2002:a1f:5ec1:: with SMTP id s184-v6mr5738866vkb.94.1531570142131;  Sat, 14 Jul 2018 05:09:02 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com> <BL0PR00MB02923AE01EFD11206587495EF5590@BL0PR00MB0292.namprd00.prod.outlook.com>
In-Reply-To: <BL0PR00MB02923AE01EFD11206587495EF5590@BL0PR00MB0292.namprd00.prod.outlook.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 14 Jul 2018 08:09:33 -0400
Message-ID: <CAGL6ep+ksw2Uf88Qe0z3GpAW0rR9AYWC6NmrqucH22qmDEbF5A@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000453b190570f47656"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/UzHLPhFNRU66ivFDsW_Hm_XDjmU>
Subject: Re: [OAUTH-WG] OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jul 2018 12:09:05 -0000

--000000000000453b190570f47656
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

:)

Thanks Mike, will do.

There are few more changes expected to the agenda, so I will send one
update to address all these changes including names.

Regards,
 Rifaat


On Thu, Jul 12, 2018 at 12:54 PM Mike Jones <Michael.Jones@microsoft.com>
wrote:

> Could you please add the names of the presenters for each of the slots?  =
I
> could be a presenter for several of them but don=E2=80=99t know whether I=
 am or
> not. ;-)
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of * Rifaat Shekh-Yusef
> *Sent:* Thursday, July 12, 2018 6:48 AM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] OAuth WG Final Agenda
>
>
>
> All,
>
>
>
> The following is our agenda for the two sessions next week:
>
> https://datatracker..ietf.org/doc/agenda-102-oauth/
> <https://datatracker.ietf.org/doc/agenda-102-oauth/>
>
>
>
>
>
> Web Authorization Protocol (OAuth) Meeting
>
> ------------------------------------------
>
>
>
> ** Tuesday 15:50-17:20 ** (90 minutes)
>
>
>
> * Chairs Update (15 min)
>
>
>
> * OAuth 2.0 Incremental Authorization (20 min)
>
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>
>
>
> * Reciprocal OAuth (30 min)
>
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>
>
>
> * OAuth 2.0 Token Binding (25 min)
>
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>
>
>
>   Short update on the following:
>
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/
>
>
>
>
>
> ** Thursday 9:30-11:00 ** (90 min)
>
>
>
> * PoP Tokens (60 min)
>
>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distr=
ibution
>
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>
>
>
>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>
>
>
> * Distributed OAuth (30 min)
>
>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>
>
>
>
> Regards,
>
>  Rifaat & Hannes
>
>
>

--000000000000453b190570f47656
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">:)<div><br></div><div>Thanks Mike, will do.</div><div><br>=
</div><div>There are few more changes expected to the agenda, so I will sen=
d one update to address all these changes including names.</div><div><br></=
div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div></div><br><div=
 class=3D"gmail_quote"><div dir=3D"ltr">On Thu, Jul 12, 2018 at 12:54 PM Mi=
ke Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@m=
icrosoft.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_54361979566407511WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">Could you please add t=
he names of the presenters for each of the slots?=C2=A0 I could be a presen=
ter for several of them but don=E2=80=99t know whether I am or not. ;-)<u><=
/u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 12, 2018 6:48 AM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] OAuth WG Final Agenda<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
All,</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
The following is our agenda for the two sessions next week:</span><u></u><u=
></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
<a href=3D"https://datatracker.ietf.org/doc/agenda-102-oauth/" target=3D"_b=
lank">https://datatracker..ietf.org/doc/agenda-102-oauth/</a></span><u></u>=
<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div style=3D"border:solid #cccccc 1.0pt;padding:8.0pt 8.0pt 8.0pt 8.0pt;ba=
ckground:#fffdf5">
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in;box-sizing:border-box;word-wrap:break-word;border-ra=
dius:4px;text-decoration-style:initial;text-decoration-color:initial;overfl=
ow:auto"><span style=3D"font-size:10.5pt;color:black">Web Authorization Pro=
tocol (OAuth) Meeting<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">------=
------------------------------------<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">** Tue=
sday 15:50-17:20 ** (90 minutes)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* Chai=
rs Update (15 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* OAut=
h 2.0 Incremental Authorization (20 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-a=
uthz/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-=
incremental-authz/</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* Reci=
procal OAuth (30 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/" =
target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-recipro=
cal/</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* OAut=
h 2.0 Token Binding (25 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding=
/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-toke=
n-binding/</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
=C2=A0Short update on the following:<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/" target=
=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a><u><=
/u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchang=
e/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-tok=
en-exchange/</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">** Thu=
rsday 9:30-11:00 ** (90 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* PoP =
Tokens (60 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribu=
tion<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distributi=
on-03" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-k=
ey-distribution-03</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 OAuth 2.0 Proof-of-Possession (PoP) Security Architecture<u></u><u></u></s=
pan></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-0=
8" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-archi=
tecture-08</a><u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black"><u></u=
>=C2=A0<u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">* Dist=
ributed OAuth (30 min)<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:#fffdf5;word-break:break-all;b=
order:none;padding:0in"><span style=3D"font-size:10.5pt;color:black">=C2=A0=
 <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/=
" target=3D"_blank">https://datatracker.ietf.org/doc/draft-hardt-oauth-dist=
ributed/</a><u></u><u></u></span></pre>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
Regards,</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Courier New&quot;">=
=C2=A0Rifaat &amp; Hannes</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div>
</div>

</blockquote></div>

--000000000000453b190570f47656--


From nobody Sat Jul 14 15:49:01 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12498124C04 for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 15:48:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rl7HYMUAeVhg for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 15:48:51 -0700 (PDT)
Received: from mail-ua0-x236.google.com (mail-ua0-x236.google.com [IPv6:2607:f8b0:400c:c08::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6AC3130F47 for <oauth@ietf.org>; Sat, 14 Jul 2018 15:48:50 -0700 (PDT)
Received: by mail-ua0-x236.google.com with SMTP id i4-v6so15866936uak.0 for <oauth@ietf.org>; Sat, 14 Jul 2018 15:48:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=uGm4rRAnA3Me+hyPJft0NWLkTo/GkHDQjPsl8udOivQ=; b=ay7i6FW35zMpcdEv+JsdfuZW1EjA6DOyuYEcy3lPtfGbcAuU/VTe3CL6GoBbccuUkR +zZjzVYSaA1i1CdY0uuroQncUBl8JT55NxNHKz0EphwRX6K8J8Ea7G9v4/Hb2IlcbGlL 8xsPJMQ0/Hnls/NsuAGDgCyuTp7543YOiquU7QMmxRDonpUDGNHHjZR5eoX188hOFtLl 5HY6PZWrXb2smMzKKciRSomFfby6ajAYfqlKLLAQ0D1snIJFdZ/RRtynKBeG48y3FvFt GlyYv2CRO3fAx78+RQRrgJRYIZANBMbV/L54D7vndNXB0GYO8FhQrqFfxAOin7V8Phon Ah9w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=uGm4rRAnA3Me+hyPJft0NWLkTo/GkHDQjPsl8udOivQ=; b=hjO7lk+moA7zR9W4BUVzVVga7OS5UBAMo9FE/yBgdSnBZPwM55eiGmoLCMWNbxcT71 24qqoW46MaXKe4VJP2RdJZejGVbQ6URq/DZBcOvJNZPyf4aAMq4qYweEkyZLt3CXmYBe QsSjDXmIke/K5vACye3Uqk5qyXmTD5PAL+ELV0XXu/fO2GV5vXuWkJijAakd1NnvLmSc JuDzWHJB6TALWbPM1FQrQCR4GRKCI9BVoWQ6CrmOuUnRLX5BpWapHqXvjDAN5c5eff9r A9UYkS7z4npA4HNZkJxGy23mXLL4u0Dt0OygQOdawgYn4TqTFzRql09oXuMaA9dteGi6 ww5Q==
X-Gm-Message-State: AOUpUlEd0PumwHsPDts6q/FRM6+SiO5xQucd/XhqLNnt6GE9pSrLUKMd WKnimgf+vvBzHcwMFCAzUxtsn+9SSXaIsD/F9toHbujy
X-Google-Smtp-Source: AAOMgpfF2Keb18drnQ1/oWDoMvina1UoBKfqwd+HrXCfyPuFQ7a/X+7sXoTiaP4RZwst0AMAQ2c5WX5WMsGMAxA4vgs=
X-Received: by 2002:ab0:51e7:: with SMTP id h36-v6mr7749173uaa.70.1531608529586;  Sat, 14 Jul 2018 15:48:49 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com>
In-Reply-To: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 14 Jul 2018 18:48:40 -0400
Message-ID: <CAGL6ep+t5urr4_5=TjthQMx13qT4Cvza1hx978mNNiJQBw-3Vg@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000574bb60570fd6616"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/8Y0BYgrYF1mhtaBnDvXB2sjMNz0>
Subject: Re: [OAUTH-WG] OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jul 2018 22:48:53 -0000

--000000000000574bb60570fd6616
Content-Type: text/plain; charset="UTF-8"

All,

Here is our latest agenda update (might not be the last one):
https://datatracker.ietf.org/doc/agenda-102-oauth/


Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization - Denniss(remotely) (20 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/

* Reciprocal OAuth - Dick (20 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/

* OAuth 2.0 Token Binding - Brian (25 min)
  https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/

  Short update on the following:
  https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
  https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/

* JWT Response for OAuth Token Introspection - Torsten(remotely) (10 min)
  https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01


** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens - Hannes (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
  https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08

* Distributed OAuth - Dick (30 min)
  https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/


Regards,
 Rifaat & Hannes

On Thu, Jul 12, 2018 at 9:48 AM Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> All,
>
> The following is our agenda for the two sessions next week:
> https://datatracker.ietf.org/doc/agenda-102-oauth/
>
>
> Web Authorization Protocol (OAuth) Meeting
> ------------------------------------------
>
> ** Tuesday 15:50-17:20 ** (90 minutes)
>
> * Chairs Update (15 min)
>
> * OAuth 2.0 Incremental Authorization (20 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>
> * Reciprocal OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>
> * OAuth 2.0 Token Binding (25 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>
>   Short update on the following:
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/
>
>
> ** Thursday 9:30-11:00 ** (90 min)
>
> * PoP Tokens (60 min)
>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>
>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>
> * Distributed OAuth (30 min)
>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>
>
> Regards,
>  Rifaat & Hannes
>
>

--000000000000574bb60570fd6616
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">All,<div><br></div><div>Here is our latest agenda update (=
might not be the last one):</div><div><a href=3D"https://datatracker.ietf.o=
rg/doc/agenda-102-oauth/">https://datatracker.ietf.org/doc/agenda-102-oauth=
/</a><br></div><div><br></div><div><br></div><div>

<pre style=3D"box-sizing:border-box;overflow:auto;font-family:&quot;PT Mono=
&quot;,Monaco,monospace;font-size:14px;display:block;padding:10px;margin:0p=
x 0px 10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-w=
rap:break-word;background-color:rgb(255,253,245);border:1px solid rgb(204,2=
04,204);border-radius:4px;text-decoration-style:initial;text-decoration-col=
or:initial">Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization - Denniss(remotely) (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-=
authz/">https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz=
/</a>

* Reciprocal OAuth - Dick (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/"=
>https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/</a>

* OAuth 2.0 Token Binding - Brian (25 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-bindin=
g/">https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/</a>
 =20
  Short update on the following:
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/">https=
://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a>
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchan=
ge/">https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/</a>

* JWT Response for OAuth Token Introspection - Torsten(remotely) (10 min) =
=20
  <a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-intros=
pection-response-01">https://tools.ietf.org/html/draft-lodderstedt-oauth-jw=
t-introspection-response-01</a>

 =20
** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens - Hannes (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distrib=
ution
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribut=
ion-03">https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-0=
3</a>

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-=
08">https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08</a>

* Distributed OAuth - Dick (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed=
/">https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/</a></pre=
>

<br></div><div>Regards,<br></div><div>=C2=A0Rifaat &amp; Hannes</div></div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr">On Thu, Jul 12, 2018 at 9:4=
8 AM Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifaat=
.ietf@gmail.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 dir=3D"ltr"><div><font face=3D"monospace, monospace">All,</font></div><div=
><font face=3D"monospace, monospace"><br></font></div><div><font face=3D"mo=
nospace, monospace">The following is our agenda for the two sessions next w=
eek:<br></font></div><div><font face=3D"monospace, monospace"><a href=3D"ht=
tps://datatracker.ietf.org/doc/agenda-102-oauth/" target=3D"_blank">https:/=
/datatracker.ietf.org/doc/agenda-102-oauth/</a><br></font></div><div><font =
face=3D"monospace, monospace"><br></font></div><div><font face=3D"monospace=
, monospace"><br></font></div><div><font face=3D"monospace, monospace">

<pre style=3D"box-sizing:border-box;overflow:auto;font-family:&quot;PT Mono=
&quot;,Monaco,monospace;font-size:14px;display:block;padding:10px;margin:0p=
x 0px 10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-w=
rap:break-word;background-color:rgb(255,253,245);border:1px solid rgb(204,2=
04,204);border-radius:4px;text-decoration-style:initial;text-decoration-col=
or:initial">Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-=
authz/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth=
-incremental-authz/</a>

* Reciprocal OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/"=
 target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-recipr=
ocal/</a>

* OAuth 2.0 Token Binding (25 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-bindin=
g/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-tok=
en-binding/</a>
 =20
  Short update on the following:
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/" targe=
t=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a>
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchan=
ge/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-to=
ken-exchange/</a>


** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distrib=
ution
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribut=
ion-03" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-=
key-distribution-03</a>

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-=
08" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-arch=
itecture-08</a>

* Distributed OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed=
/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-hardt-oauth-dis=
tributed/</a></pre>

<br></font></div><div><font face=3D"monospace, monospace"><br></font></div>=
<div><font face=3D"monospace, monospace">Regards,</font></div><div><font fa=
ce=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</font></div><div><br>=
</div></div>
</blockquote></div>

--000000000000574bb60570fd6616--


From nobody Sat Jul 14 15:50:38 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D7D0130F47 for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 15:50:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XDu2F1EHY8Rg for <oauth@ietfa.amsl.com>; Sat, 14 Jul 2018 15:50:33 -0700 (PDT)
Received: from mail-vk0-x22e.google.com (mail-vk0-x22e.google.com [IPv6:2607:f8b0:400c:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BA68124C04 for <oauth@ietf.org>; Sat, 14 Jul 2018 15:50:33 -0700 (PDT)
Received: by mail-vk0-x22e.google.com with SMTP id b14-v6so19951644vke.13 for <oauth@ietf.org>; Sat, 14 Jul 2018 15:50:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=MMRqL6SZxrssb8AonxcqK4Im5+beqv1FZ/U8KsGl9L4=; b=uEt/UXVWHczfN08fFEkC6hYNrBKnhdK/90CDLJdBnobMOsJVPOhfjiVifZeWaJSdzx lxlRNyd11g77xvjW1XUYt45lpFEccKGmm+/WNhzLfhIsK+NFQ9Gbzq8z9FNdmpSHHGx5 06xKhLNhftah0n4SFDc6vK8SNOdQXLYFQ869Iy//2ccRT9p/bH/k0M+yJKjXC9H5X5xc uLRwL+nx0iKQV6/R9NG1VraBFDvs/0NynbIlMtfT3O8yx69ARI/w8l29wCSgfgaFe4TT x+FN3fighUyp9RDePlSjli9KtBB6PnhajEqmOqpYmQo00VRArsDbbjKXpBbb5hBYwf+W Kr9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=MMRqL6SZxrssb8AonxcqK4Im5+beqv1FZ/U8KsGl9L4=; b=VZLm0OwVVPP9gQy1DKp7Pu9Xg85rW32xMrvCVCv6bMPel2YVe31MNmwlfJaR3U4gKE hakaTEy3pLMDOQuBEu2flSQksbUE9WP2NQdLfvjAoAUn6LE9sQMilWnzP81uQ7YTlGQD FN9pMQ92cUoIdHxwp4sV2RG1J1OQau8h6GKuecZLg7KGD/9W79fFV0os9sWc22RJZhlm Sb+zEEe5W/9E6fGA9R71Zj3kXTxEbNE2BoQXA2e7PxcLqqy+Bf0gi9vYDYECVvZ8rqBK S34xsmhGpL8HVxj4rUCZzDccsoA8qhm6X+feSD0mfL1nDMGFadApv6YDZEmCu91go/Ow cYqQ==
X-Gm-Message-State: AOUpUlHmjHedg5L3qg8vO1xgg5S1vfq+/LYwp6kL1NZaDxUNQVH/NjVT zCucY73AGp7DMBrMOg6JjB2ES1vjjWLAlGzpdlfXNQ==
X-Google-Smtp-Source: AAOMgpdri+rlCscdA+/1RQup25CoLZ8AmxfLX5cocitGUwzN2lKaWUSudgmHrPPm1Gb2v0B42rnts7gtDAKUhMf2kAA=
X-Received: by 2002:a1f:5ec1:: with SMTP id s184-v6mr6620959vkb.94.1531608632326;  Sat, 14 Jul 2018 15:50:32 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epLZ6WQRMtEa6VvQqWd2KiwZKjbZwDW_Ye6+b04F1HLGgw@mail.gmail.com> <CAGL6ep+t5urr4_5=TjthQMx13qT4Cvza1hx978mNNiJQBw-3Vg@mail.gmail.com>
In-Reply-To: <CAGL6ep+t5urr4_5=TjthQMx13qT4Cvza1hx978mNNiJQBw-3Vg@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 14 Jul 2018 18:50:23 -0400
Message-ID: <CAGL6epJytGZY+xb4MYXXzthvYxLw3dWwnqNTm5uH1nUoVdXBWA@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007700700570fd6c86"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/3pHuDkX-5PDgnA5a_tnaU--oQws>
Subject: Re: [OAUTH-WG] OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jul 2018 22:50:36 -0000

--0000000000007700700570fd6c86
Content-Type: text/plain; charset="UTF-8"

*Presenters*,

Please, send us your slides as soon as possible.

Regards,
 Rifaat & Hannes.


On Sat, Jul 14, 2018 at 6:48 PM Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> All,
>
> Here is our latest agenda update (might not be the last one):
> https://datatracker.ietf.org/doc/agenda-102-oauth/
>
>
> Web Authorization Protocol (OAuth) Meeting
> ------------------------------------------
>
> ** Tuesday 15:50-17:20 ** (90 minutes)
>
> * Chairs Update (15 min)
>
> * OAuth 2.0 Incremental Authorization - Denniss(remotely) (20 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>
> * Reciprocal OAuth - Dick (20 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>
> * OAuth 2.0 Token Binding - Brian (25 min)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>
>   Short update on the following:
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/
>
> * JWT Response for OAuth Token Introspection - Torsten(remotely) (10 min)
>   https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01
>
>
> ** Thursday 9:30-11:00 ** (90 min)
>
> * PoP Tokens - Hannes (60 min)
>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>
>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>
> * Distributed OAuth - Dick (30 min)
>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>
> Regards,
>  Rifaat & Hannes
>
> On Thu, Jul 12, 2018 at 9:48 AM Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
>> All,
>>
>> The following is our agenda for the two sessions next week:
>> https://datatracker.ietf.org/doc/agenda-102-oauth/
>>
>>
>> Web Authorization Protocol (OAuth) Meeting
>> ------------------------------------------
>>
>> ** Tuesday 15:50-17:20 ** (90 minutes)
>>
>> * Chairs Update (15 min)
>>
>> * OAuth 2.0 Incremental Authorization (20 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>>
>> * Reciprocal OAuth (30 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>>
>> * OAuth 2.0 Token Binding (25 min)
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-binding/
>>
>>   Short update on the following:
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>>   https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/
>>
>>
>> ** Thursday 9:30-11:00 ** (90 min)
>>
>> * PoP Tokens (60 min)
>>   OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-03
>>
>>   OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>   https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-08
>>
>> * Distributed OAuth (30 min)
>>   https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>>
>>
>>
>> Regards,
>>  Rifaat & Hannes
>>
>>

--0000000000007700700570fd6c86
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><b>Presenters</b>,<div><br></div><div>Please, send us your=
 slides as soon as possible.</div><div><br></div><div>Regards,</div><div>=
=C2=A0Rifaat &amp; Hannes.</div><div><br></div></div><br><div class=3D"gmai=
l_quote"><div dir=3D"ltr">On Sat, Jul 14, 2018 at 6:48 PM Rifaat Shekh-Yuse=
f &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifaat.ietf@gmail.com</a>&gt=
; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">All,<div>=
<br></div><div>Here is our latest agenda update (might not be the last one)=
:</div><div><a href=3D"https://datatracker.ietf.org/doc/agenda-102-oauth/" =
target=3D"_blank">https://datatracker.ietf.org/doc/agenda-102-oauth/</a><br=
></div><div><br></div><div><br></div><div>

<pre style=3D"box-sizing:border-box;overflow:auto;font-family:&quot;PT Mono=
&quot;,Monaco,monospace;font-size:14px;display:block;padding:10px;margin:0p=
x 0px 10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-w=
rap:break-word;background-color:rgb(255,253,245);border:1px solid rgb(204,2=
04,204);border-radius:4px;text-decoration-style:initial;text-decoration-col=
or:initial">Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization - Denniss(remotely) (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-=
authz/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth=
-incremental-authz/</a>

* Reciprocal OAuth - Dick (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/"=
 target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-recipr=
ocal/</a>

* OAuth 2.0 Token Binding - Brian (25 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-bindin=
g/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-tok=
en-binding/</a>
 =20
  Short update on the following:
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/" targe=
t=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a>
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchan=
ge/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-to=
ken-exchange/</a>

* JWT Response for OAuth Token Introspection - Torsten(remotely) (10 min) =
=20
  <a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-intros=
pection-response-01" target=3D"_blank">https://tools.ietf.org/html/draft-lo=
dderstedt-oauth-jwt-introspection-response-01</a>

 =20
** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens - Hannes (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distrib=
ution
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribut=
ion-03" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-=
key-distribution-03</a>

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-=
08" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-arch=
itecture-08</a>

* Distributed OAuth - Dick (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed=
/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-hardt-oauth-dis=
tributed/</a></pre>

<br></div><div>Regards,<br></div><div>=C2=A0Rifaat &amp; Hannes</div></div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr">On Thu, Jul 12, 2018 at 9:4=
8 AM Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=
=3D"_blank">rifaat.ietf@gmail.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div dir=3D"ltr"><div><font face=3D"monospace, monospace">All=
,</font></div><div><font face=3D"monospace, monospace"><br></font></div><di=
v><font face=3D"monospace, monospace">The following is our agenda for the t=
wo sessions next week:<br></font></div><div><font face=3D"monospace, monosp=
ace"><a href=3D"https://datatracker.ietf.org/doc/agenda-102-oauth/" target=
=3D"_blank">https://datatracker.ietf.org/doc/agenda-102-oauth/</a><br></fon=
t></div><div><font face=3D"monospace, monospace"><br></font></div><div><fon=
t face=3D"monospace, monospace"><br></font></div><div><font face=3D"monospa=
ce, monospace">

<pre style=3D"box-sizing:border-box;overflow:auto;font-family:&quot;PT Mono=
&quot;,Monaco,monospace;font-size:14px;display:block;padding:10px;margin:0p=
x 0px 10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-w=
rap:break-word;background-color:rgb(255,253,245);border:1px solid rgb(204,2=
04,204);border-radius:4px;text-decoration-style:initial;text-decoration-col=
or:initial">Web Authorization Protocol (OAuth) Meeting
------------------------------------------

** Tuesday 15:50-17:20 ** (90 minutes)

* Chairs Update (15 min)

* OAuth 2.0 Incremental Authorization (20 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-=
authz/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth=
-incremental-authz/</a>

* Reciprocal OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/"=
 target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-recipr=
ocal/</a>

* OAuth 2.0 Token Binding (25 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-bindin=
g/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-tok=
en-binding/</a>
 =20
  Short update on the following:
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/" targe=
t=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a>
  <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchan=
ge/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-to=
ken-exchange/</a>


** Thursday 9:30-11:00 ** (90 min)

* PoP Tokens (60 min)
  OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distrib=
ution
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribut=
ion-03" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-=
key-distribution-03</a>

  OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
  <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-=
08" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-oauth-pop-arch=
itecture-08</a>

* Distributed OAuth (30 min)
  <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed=
/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-hardt-oauth-dis=
tributed/</a></pre>

<br></font></div><div><font face=3D"monospace, monospace"><br></font></div>=
<div><font face=3D"monospace, monospace">Regards,</font></div><div><font fa=
ce=3D"monospace, monospace">=C2=A0Rifaat &amp; Hannes</font></div><div><br>=
</div></div>
</blockquote></div>
</blockquote></div>

--0000000000007700700570fd6c86--


From nobody Tue Jul 17 06:35:59 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27EEE12F1A2 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:35:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id if-hfQAfIWFE for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:35:55 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03on0621.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0a::621]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D955B130DC7 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:35:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zfcJzstQOcDkqzMBplnsDD18iflLfN0RehX6z2wypi8=; b=P/ai57yZ4T75dc7loO9r1H5K7tZT16jbo7hfk4+MRAafrfOFLvE15nN72E1/fPgpXLC2ttS7gncu1wJ4zctuXWfN2yc1pwdjqEvNN9XWPt966fipPYeNJl6QRHZNnohM9XbdqQrIoTx7mMMRlzq/9wwQqSXge/X4qExnd++Nf8w=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1392.eurprd08.prod.outlook.com (10.167.198.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.18; Tue, 17 Jul 2018 13:35:51 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Tue, 17 Jul 2018 13:35:51 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Yaron Sheffer <yaronf.ietf@gmail.com>, Dick Hardt <dick.hardt@gmail.com>,  "dick@amazon.com" <dick@amazon.com>, Mike Jones <Michael.Jones@microsoft.com>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: IPR confirmation for draft-ietf-oauth-jwt-bcp-03
Thread-Index: AdQd0wXe7c+RbgwkQ+G4SSH6Y364Kw==
Date: Tue, 17 Jul 2018 13:35:50 +0000
Message-ID: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1392; 7:Gaf0JDrBzAe945Aw77Uf2Y8apMkT9Fc6Uq4eudgbdKmmdhbglvB/48mgGL9vn0i5jJbrkVnC7MZxWKFNHy906tq+D6W7Rn3kZ0f/eCxv8Yx2KKa++EFtR1d0lz8pObLk9b33p3hWlHiLtHx76g+ZXGPkj43Y1Bwuw/EbPXbQS1n74PMo7BxEsoKn+RWRYCPfDdd6gzbFm7S6i902SIk3YdQCkwDj3G3MCK6/e2hVcWCQZXf3LB/8/tPtij+bugwr
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: a0c73244-635c-4c7b-fc2f-08d5ebea3663
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1392; 
x-ms-traffictypediagnostic: VI1PR0801MB1392:
x-microsoft-antispam-prvs: <VI1PR0801MB1392968185A65D3270200844FA5C0@VI1PR0801MB1392.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231311)(944501410)(52105095)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123560045)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1392; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1392; 
x-forefront-prvs: 073631BD3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(366004)(396003)(376002)(39860400002)(346002)(199004)(189003)(40434004)(39060400002)(55016002)(6306002)(54896002)(4326008)(106356001)(105586002)(53936002)(25786009)(72206003)(478600001)(6436002)(2906002)(2501003)(316002)(110136005)(476003)(2900100001)(5250100002)(186003)(486006)(74316002)(3846002)(5660300001)(99286004)(66066001)(790700001)(1511001)(7736002)(7696005)(6116002)(9686003)(33656002)(102836004)(5024004)(97736004)(256004)(81166006)(6506007)(68736007)(8676002)(8936002)(86362001)(81156014)(14444005)(14454004)(26005); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1392; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: fs4hfr/7T0tHdYgsUc3Uq5EDxigihn1a3bQY/cSApXgz1or3vS7LP4E042IoUjUSAZQsgHbcLmCrpsdyI+YZ++BbYdgFwSXrD3BSTCpPToSYsvMhgaR/p0m5EkCRsfvFD5HEVh/cIUU9mpgvaUw1rfff59iA3Cocu+n6E0afK+v5KO8ccxwSzxChRjrVqcW05gNU5LHFpeWZmEiWI0i0SF7Ogz2l54LFgzsWwJQFfncInsprIUmLrOfPenSgWsHY2b1OEKH/7gagCFhVXLHG5hMpxBmRLHmg3cnlP9werqiylOaoaPOn2S40KgbF/J3G3MAvRPFkw/fVGcJtV42LaCigtxyASd6GWMGO07pYPLQ=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2112BAF58658C304BFC06199FA5C0VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a0c73244-635c-4c7b-fc2f-08d5ebea3663
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2018 13:35:50.8368 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1392
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/w422OoxN2DwmJfZEpR1msKWNY-U>
Subject: [OAUTH-WG] IPR confirmation for draft-ietf-oauth-jwt-bcp-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 13:35:58 -0000

--_000_VI1PR0801MB2112BAF58658C304BFC06199FA5C0VI1PR0801MB2112_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Yaron, Dick, Mike,

Please confirm that any and all appropriate IPR disclosures required for fu=
ll conformance with the provisions of BCP 78 and BCP 79 have already been f=
iled for draft-ietf-oauth-jwt-bcp-03.

Ciao
Hannes
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB2112BAF58658C304BFC06199FA5C0VI1PR0801MB2112_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi Yaron, Dick, Mike, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Please confirm that any and all appropriate IPR disc=
losures required for full conformance with the provisions of BCP 78 and BCP=
 79 have already been filed for draft-ietf-oauth-jwt-bcp-03.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes<o:p></o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB2112BAF58658C304BFC06199FA5C0VI1PR0801MB2112_--


From nobody Tue Jul 17 06:36:48 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEF8B130DC7 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:36:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q0TQBqFn6lEb for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:36:43 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640090.outbound.protection.outlook.com [40.107.64.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F45D12F1A2 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:36:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eb10sOxaUXDVl1qGF2aTokmLvBaxvKFnKNC8SIXeaKw=; b=GayepzybtYBjHdNMzltkLFq2YbriA1ep2Hn58V77W7cRdhlVzEHMiv8didcMIjmKipgo6O46I9/08UZ6pv8CM5TR7L5hD4OD6s/kGYu212kBvDwV/x+2TH+R9Ofla2X0iAtC4HbxJUIIcRqWcLB3c5YNQ9rRSEcBwxtbS/CXBYQ=
Received: from MW2PR00MB0298.namprd00.prod.outlook.com (52.132.148.29) by MW2PR00MB0444.namprd00.prod.outlook.com (52.132.149.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1010.0; Tue, 17 Jul 2018 13:36:40 +0000
Received: from MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::40d0:7f75:41be:2672]) by MW2PR00MB0298.namprd00.prod.outlook.com ([fe80::40d0:7f75:41be:2672%4]) with mapi id 15.20.1011.000; Tue, 17 Jul 2018 13:36:40 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Yaron Sheffer <yaronf.ietf@gmail.com>, Dick Hardt <dick.hardt@gmail.com>, "dick@amazon.com" <dick@amazon.com>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: IPR confirmation for draft-ietf-oauth-jwt-bcp-03
Thread-Index: AdQd0wXe7c+RbgwkQ+G4SSH6Y364KwAAB4CQ
Date: Tue, 17 Jul 2018 13:36:40 +0000
Message-ID: <MW2PR00MB02988B8E17B8F7C1C00C538BF55C0@MW2PR00MB0298.namprd00.prod.outlook.com>
References: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
In-Reply-To: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:67c:1232:144:b0cd:50e:127c:eea]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR00MB0444; 6:iJrA2jh4zwRHZBBsYCelgwabm5ZQJUnvvBYEW0AWvTWnPUpThPt0WZd/KVvPOdioUeUtyGuZH+hyEZL1/W7G5ptvkodkLNnM3KS4xnp+nbuM+y4CyKbeeGoTKn4aeG/yYuGjG6lyVvNJdOhC+qKbYM1hcnnzMmzfbieopsNetHZs9O5mtSw3NqyD4w4IcWCPZls1rInkP3k7qjaXVNsKg7gyM+EDMgS9eMB9qP8zgYAiGkSdco3zpuyG/qfE4lOFL892saG4CCvujrDXrKEPhapzMCTd2Hv9wbKfZvTtPMD0QudoxkPc3g5q2hija6RMgXvxdDkU9ETB67eKC5jB76lyVCJEZxtQ+sX0lZP4UqkMciMFO85TrnEzFThvrBx/curbN5bSa0//1PYcvbmR+flt7Zik2bcu7GV5cVilWYQNbnbO4FG+DCzFWQhIgMT8g5jGzpaaa92YOATCHmDzbA==; 5:qtFNX/zJwyp3HezGvWTnJakKwiH3q7Lh+YoymVALaToR72hpuSSon8f9p2FB12HRCvFA6a9qE8z4THsMjRh+2nHvWbOehErjcTBaRUGQui29h0J5ehNH3TkH++SXpdzZSGfRHhmBiKpYRxzz5ZtQR82EBpJjJGKWspJzrU/iwlI=; 7:BnkGc+5pM7M4/Ohgr00UNi6yM7/FT2weg7zkpPPxQWuDYYlfX4mVYhlEjg9j2LLpnPY09ZLm/erGimY1OVgB1T9MvPfGP0oxlsRmkSOAucR3p9bU925s1NQ6SRTjHLIro9TlAC/SmbSBpjsrJZAZ+RHgzxA+Idl9CH/9ajZyejd40VtlBT7sUVRqLDaW9nEgCLoon+5VTO0dM5tsWv7hlo32sR2+/MwxD6VhSQUjZNGLFPgkRYS4AUkOFwo6kEtL
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: a662d143-b77b-4b93-a844-08d5ebea53bf
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:(223705240517415); BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7193020); SRVR:MW2PR00MB0444; 
x-ms-traffictypediagnostic: MW2PR00MB0444:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-microsoft-antispam-prvs: <MW2PR00MB044418CDEC374F5DF97712B1F55C0@MW2PR00MB0444.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(180628864354917)(89211679590171)(223705240517415)(85827821059158)(21748063052155)(47284530071512);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3231311)(944501410)(52105095)(2018427008)(93006095)(93001095)(3002001)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123564045)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:MW2PR00MB0444; BCL:0; PCL:0; RULEID:; SRVR:MW2PR00MB0444; 
x-forefront-prvs: 073631BD3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(346002)(366004)(376002)(136003)(39860400002)(40434004)(199004)(189003)(68736007)(76176011)(86612001)(86362001)(81166006)(446003)(10290500003)(99286004)(2501003)(97736004)(4326008)(39060400002)(19609705001)(7696005)(5024004)(256004)(8936002)(5250100002)(72206003)(14444005)(186003)(53936002)(5660300001)(316002)(22452003)(7736002)(14454004)(2906002)(478600001)(11346002)(8990500004)(6246003)(790700001)(476003)(110136005)(33656002)(46003)(74316002)(106356001)(105586002)(6116002)(486006)(53546011)(6506007)(25786009)(10090500001)(102836004)(8676002)(55016002)(6436002)(6306002)(9686003)(54896002)(229853002)(2900100001)(81156014); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR00MB0444; H:MW2PR00MB0298.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: dLGXJYMR1nqZTbCMw5DpPhG0pxIWP3WEHL6GqpmA1SFLY6RuxEhvW6hBQn04eN2qfHiEbmy5YU45tXT5LrnPp5m6RWTQwfGd7wGbZSVQTKLZ8DjW3cxI47Au216e1PfbZK0IK1w92gLXbVOD55WA6RTyLCsLs1LOZmNYHfYsXmmlOiM0OD/RmeNZOVLtefcMSGO9WmN6LtyCiRGT3BQKbx2yQJ7IvI5nSC9j0N8/flRO1lv7vivb/EWssA0XUCKiVipCRjOfxUe9O9w276kVoPmVIk/TuDv3T2lt+cTUXwv1U5ctjxNkyG5FVK8ZGxnVNiPSqOvy9B3X/2cNuDz7aDvZbnCFT2UWmzg0TmCPkB0=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_MW2PR00MB02988B8E17B8F7C1C00C538BF55C0MW2PR00MB0298namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a662d143-b77b-4b93-a844-08d5ebea53bf
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2018 13:36:40.1926 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR00MB0444
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/klmz2G7MT5gzR-cwka4h6tZd2SU>
Subject: Re: [OAUTH-WG] IPR confirmation for draft-ietf-oauth-jwt-bcp-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 13:36:46 -0000

--_000_MW2PR00MB02988B8E17B8F7C1C00C538BF55C0MW2PR00MB0298namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I am not aware of any IPR that pertains to the JWT BCP document.

                                                       -- Mike

From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Sent: Tuesday, July 17, 2018 9:36 AM
To: Yaron Sheffer <yaronf.ietf@gmail.com>; Dick Hardt <dick.hardt@gmail.com=
>; dick@amazon.com; Mike Jones <Michael.Jones@microsoft.com>
Cc: oauth@ietf.org
Subject: IPR confirmation for draft-ietf-oauth-jwt-bcp-03

Hi Yaron, Dick, Mike,

Please confirm that any and all appropriate IPR disclosures required for fu=
ll conformance with the provisions of BCP 78 and BCP 79 have already been f=
iled for draft-ietf-oauth-jwt-bcp-03.

Ciao
Hannes
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_MW2PR00MB02988B8E17B8F7C1C00C538BF55C0MW2PR00MB0298namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">I am not aware of any =
IPR that pertains to the JWT BCP document.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Hannes Tschofenig &lt;Hannes.Tschofenig=
@arm.com&gt; <br>
<b>Sent:</b> Tuesday, July 17, 2018 9:36 AM<br>
<b>To:</b> Yaron Sheffer &lt;yaronf.ietf@gmail.com&gt;; Dick Hardt &lt;dick=
.hardt@gmail.com&gt;; dick@amazon.com; Mike Jones &lt;Michael.Jones@microso=
ft.com&gt;<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> IPR confirmation for draft-ietf-oauth-jwt-bcp-03<o:p></o:p>=
</p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hi Yaron, Dick, Mike, <o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Please confirm that any and all=
 appropriate IPR disclosures required for full conformance with the provisi=
ons of BCP 78 and BCP 79 have already been filed for draft-ietf-oauth-jwt-b=
cp-03.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Ciao<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hannes<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">IMPORTANT NOTICE: The contents =
of this email and any attachments are confidential and may also be privileg=
ed. If you are not the intended recipient, please notify the sender immedia=
tely and do not disclose the contents
 to any other person, use it for any purpose, or store or copy the informat=
ion in any medium. Thank you.
<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_MW2PR00MB02988B8E17B8F7C1C00C538BF55C0MW2PR00MB0298namp_--


From nobody Tue Jul 17 06:37:13 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C68B130F3C for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:37:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W0Mj9EzxBDwg for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:37:00 -0700 (PDT)
Received: from mail-pf0-x232.google.com (mail-pf0-x232.google.com [IPv6:2607:f8b0:400e:c00::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47DE6130F53 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:37:00 -0700 (PDT)
Received: by mail-pf0-x232.google.com with SMTP id j8-v6so520894pff.6 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:37:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QIaaHqgjLo0jJtR9TTWq0U6H7CKZCQgDRBZmuRtRe5I=; b=gwtS6/TdcIZ95wQE2u/1Cn+g3JV+aplggj2unh7e0ajYoIxUjpbwR49lmv1NXz9azJ SlBwzHdR72psLD7UL4hUI7BnpnPqz+ft738Xm+hN5ju0B+l1v6Uq06o+U7Dwr24y+VO7 9pPvSi8EQUpoWZx98oFC38E2KQ8/Dlt5uZEiqxT7lPfsyKiXCcnvFYSoCZwZ5bCaxsiD cQmU8fWaJvTtZsn85k0Ws0AYE/hI3ovMy63kszAwNsW5Zbik7i7McIO/qarp0n5+84bW 6ae5qvuK6ItJvWqeUGuyCYQgyGPI1PyAPo2zoycKGK1kHa8pjVDFU7qt8WBCNvORJmB/ eNfg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QIaaHqgjLo0jJtR9TTWq0U6H7CKZCQgDRBZmuRtRe5I=; b=KuLebMoqBp4ia2MgO3B4u/aKxOHyhPAXU2w2rMnTNbLFYz+no2QDGoDi1Dp7YoAUva x3ZudeWE4FfrJpL1DC3QjRTOErZ/IW4bVOAUx9Kyrwgj0JAnGm9r9fSEPn826+iNQtQC OERAVYqajhz+Mt5nurRMjEUHVtrslhI1q9Ro6hLrC8tSPRby0FF4bQHLZb+4I/beuzub aSDYNa36CC7pn+0WcACvjCcCdBUzCizZTLpUmiYq8Ex3bAeFCeb5Q2JgzXATqkcrkEka nB13u4HblBIzUzhTniu5lMvdOOPO+Q0uXQ39BN9R9tNieJ9u/v6X4I+AjhFHRmUIYkEs 0jQA==
X-Gm-Message-State: AOUpUlEtRLXcTJdbz5lwRBoy4HsXc4N8hZPQ70jzlI7sTSLvPEZF5DFX jmaKbakjNfNjVlJ7z+RSW23MsrfO63+PRxJx6nE=
X-Google-Smtp-Source: AAOMgpeBjlAh2BovETgKgpaKvabh/43yxPwR0IPmZxv5/9SjM64rP9LqMwyGjOkMrBoLskxqGdLY1Jws9JER50Cj0T8=
X-Received: by 2002:a65:62ce:: with SMTP id m14-v6mr1618196pgv.407.1531834619669;  Tue, 17 Jul 2018 06:36:59 -0700 (PDT)
MIME-Version: 1.0
References: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
In-Reply-To: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 17 Jul 2018 09:36:47 -0400
Message-ID: <CAD9ie-vJ4uNsDSddHcfD5XwFy=kqgsbSLGMuVYzMY4tx-Lb8zg@mail.gmail.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Mike Jones <Michael.Jones@microsoft.com>, Yaron Sheffer <yaronf.ietf@gmail.com>,  "dick@amazon.com" <dick@amazon.com>, "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005c35c30571320aa4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/YDUf-796DKWEorkDcxcq8pKnv74>
Subject: Re: [OAUTH-WG] IPR confirmation for draft-ietf-oauth-jwt-bcp-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 13:37:11 -0000

--0000000000005c35c30571320aa4
Content-Type: text/plain; charset="UTF-8"

Confirmed, thanks.


On Tue, Jul 17, 2018 at 9:35 AM Hannes Tschofenig <Hannes.Tschofenig@arm.com>
wrote:

> Hi Yaron, Dick, Mike,
>
>
>
> Please confirm that any and all appropriate IPR disclosures required for
> full conformance with the provisions of BCP 78 and BCP 79 have already been
> filed for draft-ietf-oauth-jwt-bcp-03.
>
>
>
> Ciao
>
> Hannes
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy the
> information in any medium. Thank you.
>

--0000000000005c35c30571320aa4
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div>Confirmed, thanks.</div><div><br></div><div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr">On Tue, Jul 17, 2018 at 9:35 AM Hannes Tschofenig &lt=
;<a href=3D"mailto:Hannes.Tschofenig@arm.com">Hannes.Tschofenig@arm.com</a>=
&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 =
0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"m_5704727354850676969WordSection1">
<p class=3D"MsoNormal">Hi Yaron, Dick, Mike, <u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Please confirm that any and all appropriate IPR disc=
losures required for full conformance with the provisions of BCP 78 and BCP=
 79 have already been filed for draft-ietf-oauth-jwt-bcp-03.<u></u><u></u><=
/p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Ciao<u></u><u></u></p>
<p class=3D"MsoNormal">Hannes<u></u><u></u></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</div>

</blockquote></div></div>

--0000000000005c35c30571320aa4--


From nobody Tue Jul 17 06:58:47 2018
Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE9F6130FB5 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:58:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFnzdPsQPCDj for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 06:58:35 -0700 (PDT)
Received: from mail-io0-x22e.google.com (mail-io0-x22e.google.com [IPv6:2607:f8b0:4001:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F974130F35 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:58:35 -0700 (PDT)
Received: by mail-io0-x22e.google.com with SMTP id z19-v6so1054638ioh.4 for <oauth@ietf.org>; Tue, 17 Jul 2018 06:58:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=ad59e3vcLRG3Zg6i1AXqVVya85Q7hV5ogBwHdJL+ZE8=; b=CRfStZ5tzs1/SfGejbVZ7NsZq/exJMGb2fOzXVjNviOmUGdaR+r2RWSBrHHwGoR+3O F8zz611H/F+5tlWM/iH9vZfn1ohHrxE0sYjbPbvD+pAuVjHxFnOkfmtTk46Lshkubt21 KeRVXPNqyi24oupGHgv0dReIJ3Dgl8P+nOhpe77ivSYuGxjsfNzTkVVidiJ8SNCg+v6h uwEh6u0XvGUPTJE3I6jRQx65NY3rRAv/KhlDEjR/ZdH2E+uRxZQU5WE1LKQLR0yxjeNS JPEXGLlnhosWT93kz4/bR+QaSfxsLB9FZ+fzgybBLqnOclRsihiYUpEs6DTTwzO3wImn /bwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ad59e3vcLRG3Zg6i1AXqVVya85Q7hV5ogBwHdJL+ZE8=; b=IzL6TnbxOz/ahZrq54L+xXCgXVKH33WJ65JJ6ntuYp9hCpU+Tdg/p0Z5HIDo1uUAhD WHp1yf1LadrLsgf5NCodn/wd2+zJL5u81TNbdle4GsbpxgbnafheAx280IAQSoF0Iybo ccRt5Vc5//eM8HVY7CGJH++Clqn/FNg/qP8pVmoVlR617z0GVWW5tyyHlPDVODfr0Nw6 B3k3qlnvMUkXA2ls5I2OYuzXEqNBIFmLnQrgRDu4dpo7F1se6miWyFHRQOthGvMTOTin Cuz21ZnRg9J7rUc3BR+uHF842ob3EFdjN7WP606PaHplYvx0t7QodOfsqdm0l3f+5Epl Gpqg==
X-Gm-Message-State: AOUpUlHeCSRRPUVHY7eiY2RxTqW+QPf8Gi8+IZ0Wouj8HyBYxFEJD15C o+aUREizba3y0AuNlM3mWkIQlCMt
X-Google-Smtp-Source: AA+uWPxfyVnNVpu6/idqh5FmX11zAT0kP6j1xpHJbP/usq4djIn3DHG0dF4xyURrOqWJUeGhrkSAQg==
X-Received: by 2002:a6b:5b16:: with SMTP id v22-v6mr1431027ioh.265.1531835914403;  Tue, 17 Jul 2018 06:58:34 -0700 (PDT)
Received: from [172.20.5.95] ([207.115.103.227]) by smtp.gmail.com with ESMTPSA id j137-v6sm655800ita.27.2018.07.17.06.58.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Jul 2018 06:58:33 -0700 (PDT)
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Dick Hardt <dick.hardt@gmail.com>, "dick@amazon.com" <dick@amazon.com>, Mike Jones <Michael.Jones@microsoft.com>
Cc: "oauth@ietf.org" <oauth@ietf.org>
References: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
From: Yaron Sheffer <yaronf.ietf@gmail.com>
Message-ID: <a85e59bd-2540-f7d0-1ab5-da5ac215a78f@gmail.com>
Date: Tue, 17 Jul 2018 09:58:32 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <VI1PR0801MB2112BAF58658C304BFC06199FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/4xevzqcuHin75EPev7LMOKP-WeU>
Subject: Re: [OAUTH-WG] IPR confirmation for draft-ietf-oauth-jwt-bcp-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 13:58:45 -0000

Confirmed.

	Yaron

On 17/07/18 09:35, Hannes Tschofenig wrote:
> Hi Yaron, Dick, Mike,
> 
> Please confirm that any and all appropriate IPR disclosures required for 
> full conformance with the provisions of BCP 78 and BCP 79 have already 
> been filed for draft-ietf-oauth-jwt-bcp-03.
> 
> Ciao
> 
> Hannes
> 
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy 
> the information in any medium. Thank you.


From nobody Tue Jul 17 07:06:32 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13A01130DFD for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:06:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7H0EjU9vGE7x for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:06:29 -0700 (PDT)
Received: from mail-it0-x22e.google.com (mail-it0-x22e.google.com [IPv6:2607:f8b0:4001:c0b::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F64C129385 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:06:29 -0700 (PDT)
Received: by mail-it0-x22e.google.com with SMTP id 16-v6so1959293itl.5 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:06:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=wu0qu5X8CakyvFIp603Y3inm4cF1k2L2ErzAfs/0LOY=; b=T5LNHAPgbi09/jKclV/HZc6IkqWMuGfsxuVbdzRBSSJnZC/f/mPUssTHCjOIV7tWkl aJHGiHn77l4MhZHWXATt6liGmfZC1q6G0iNU4BuamkJAG+oBZ7+0QTQySKOJkgZfm86Q 3nxwa3cxdlnFP0wau1EyWkJ4nJeSE8jIUkZrhClodjXZxrOH+sCx9C2D2sW8b/C4NvXR 1xUA41Rfq1LL0TRVG4Wb+fT8OI3s4arOVDsXtpDm7v81XOPqJ1SOzU2oATWhPmJo2py4 m7S6AYueB/rs6T1qKwlGq1JOy4vpjQz7Rl0+OxDooAfqU6Ix4OPDRDEu1YJj/mKyldHd AqHQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=wu0qu5X8CakyvFIp603Y3inm4cF1k2L2ErzAfs/0LOY=; b=INvRJ7YLCx0FBUWcuhCLVobDGtvzHPbJrwfE/rm5EFiwlMC5LC04siQK/eNFUq/sE9 Bw/FTyaILZ472gBlfqcXphS9F8a9X658MP3/2z86UpJ72ZHo4Pql8MFvpxgOeXiYg8TU w5se3jI/cIDcwQ8IO9jQ+N+D/vaEv4gZKWNkO204oepqaRXJK9XEyN3iO7oBNhCG79jc OjdldUtH0AGR0z/0JRXE7voJPbem4mrlVtvs8R8UHqR+8n/6P5qktim36osILG7SSPB1 uYg5GefvwiDB4PiWewTSRcnsdY63V7MIIm/BFLH0O/5s3p3FK35np7vJ3Ijf3E/rn8es DaAA==
X-Gm-Message-State: AOUpUlHZ4sd4kc4BQlPOMQ3xMhehh23jS4D0OykrtG+nWCrwpYPkS7Xi dRZetK+YOfEdq1NUu1tmQNhIzVwSq3GeuFEh8suL7pbPrzs=
X-Google-Smtp-Source: AAOMgpdKEKHVNYYXrG3Qpv6D6a+RCx78QhnFkGuZ08vrdvxTNAQAwGJt9NF8duPEbISa6kB4jl+JPrkOB3bmvNGLNio=
X-Received: by 2002:a24:69c6:: with SMTP id e189-v6mr1596670itc.21.1531836388426;  Tue, 17 Jul 2018 07:06:28 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 17 Jul 2018 10:07:02 -0400
Message-ID: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c94916057132732e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ia-CLpjS81uN26oYBvUuVcolAuQ>
Subject: [OAUTH-WG] MTLS - IPR Disclosure
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:06:31 -0000

--000000000000c94916057132732e
Content-Type: text/plain; charset="UTF-8"

Authors,

As part of the write-up for the OAuth MTLS document, we need an IPR
disclosure from all of you.

Are you aware of any IPR related to the following OAuth MTLS document?
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/

Regards,

--000000000000c94916057132732e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Authors,</div><div><br></div><div>As part of the writ=
e-up for the OAuth MTLS document, we need an IPR disclosure from all of you=
.</div><div><br></div><div>Are you aware of any IPR related to the followin=
g OAuth MTLS document?</div><div><a href=3D"https://datatracker.ietf.org/do=
c/draft-ietf-oauth-mtls/">https://datatracker.ietf.org/doc/draft-ietf-oauth=
-mtls/</a></div><div><br></div><div>Regards,</div><div><br></div></div>

--000000000000c94916057132732e--


From nobody Tue Jul 17 07:12:21 2018
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81977127AC2 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:12:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UqL_v7ioMADH for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:12:12 -0700 (PDT)
Received: from mail-wm0-x232.google.com (mail-wm0-x232.google.com [IPv6:2a00:1450:400c:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9471A130E19 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:12:12 -0700 (PDT)
Received: by mail-wm0-x232.google.com with SMTP id s9-v6so1678679wmh.3 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:12:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pSyA2v623gutEKdthUfavViF+/e7OYPoXzs915bonmA=; b=EczPOqGEuDSB+FFlN/0jF1J2p0vB7wrDPiPfm2T46k9J+NIVrACenPOCPuo81JuCNq iDYUuAD8o2MY4qMwrnBAkgdWcPb+ENOvD2yfE1F6OndV7+PxscY/uwE/4Eijm9ROP6A/ Wg2rQlePS8uGMZMF0KsPSQYgv1q1Co5QKWX4ZMu4B/5ILEjB4xU5qblOAwbf6axmkp5z Gmy/FH0kosohrlJPLKajCz+DQVdKVgSsm9XMsvGynu3ZX10slWZkB2Ki5HNRuraiop9q Y1ffJzU+eAIsJJVfnRQPqUFnV8Q89OFffjz7NKlxNHbZADQUkKfkZ+k5GQvvc4da8Ka5 608A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pSyA2v623gutEKdthUfavViF+/e7OYPoXzs915bonmA=; b=SK8KNXABN7V2EFfnIEiClWUICWzrvJZ0W9O/+QD2qQTMt90oEZzYQ/1Vp2UzTX5QB0 3iq/zE0WC8QZe02BVsFYzXcyZX1x0jPT9W4cRyExm/yy6UTgUPS3+qNAh4DlalcU/626 mDe3m++/jP5xxMH7S+g+UeoTRqaiSvzYmycoF6XqHSjgOft6HpDBAUFpl/uOMxZ09ppr u1S7zpk4XXwyNKe0FQnit3IowtydBJx8ZCI3vLibJ5XGf2EdAuSuBZM2ep7HxNZZIn/f hlnIQaZHSk7fRWU3EY6rhVETS5QkB9FfxlWMjpe8Qg5/3pRm0FK3SBj8ZOavMrlrMBPe soJw==
X-Gm-Message-State: AOUpUlG8kOOEyz2caSRmyBHDC0GOjs4SsoCt0gbjPCoSPlz5N/sOoQZk fd5KAYvqjwELJc9O94fEUu3iEXmUTwb9r3WHFKU=
X-Google-Smtp-Source: AAOMgpfrp4g/e3zcnsLql6NKUfkInI3FutCTjtAjsdac94JudpATGihEap5F/K45dlom+tL4l7h1k2xrcuBFVfEtBPg=
X-Received: by 2002:a1c:3a8f:: with SMTP id h137-v6mr1593896wma.41.1531836730846;  Tue, 17 Jul 2018 07:12:10 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
In-Reply-To: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
Date: Tue, 17 Jul 2018 23:11:58 +0900
Message-ID: <CABzCy2BoOCzb8uMVAzq0ZdFXjtBajMt-8JHyM8s5r3SGqkc89w@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000032312d057132883e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mGwRLtINsnBkLpMyG0Rle285YXM>
Subject: Re: [OAUTH-WG] MTLS - IPR Disclosure
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:12:19 -0000

--00000000000032312d057132883e
Content-Type: text/plain; charset="UTF-8"

Not that I am aware of.

On Tue, Jul 17, 2018 at 11:06 PM Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Authors,
>
> As part of the write-up for the OAuth MTLS document, we need an IPR
> disclosure from all of you..
>
> Are you aware of any IPR related to the following OAuth MTLS document?
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>
> Regards,
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en

--00000000000032312d057132883e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Not that I=C2=A0am aware of.=C2=A0</div><br><div class=3D"=
gmail_quote"><div dir=3D"ltr">On Tue, Jul 17, 2018 at 11:06 PM Rifaat Shekh=
-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifaat.ietf@gmail.com</=
a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div=
>Authors,</div><div><br></div><div>As part of the write-up for the OAuth MT=
LS document, we need an IPR disclosure from all of you..</div><div><br></di=
v><div>Are you aware of any IPR related to the following OAuth MTLS documen=
t?</div><div><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-m=
tls/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-oauth-m=
tls/</a></div><div><br></div><div>Regards,</div><div><br></div></div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature" data-smartmail=3D"gmail_signature">Nat Sakimura =
(=3Dnat)<div>Chairman, OpenID Foundation<br><a href=3D"http://nat.sakimura.=
org/" target=3D"_blank">http://nat.sakimura.org/</a><br>@_nat_en</div></div=
>

--00000000000032312d057132883e--


From nobody Tue Jul 17 07:22:58 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACDEB130F1F for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:22:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id spvhf0adF5zK for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:22:41 -0700 (PDT)
Received: from mail-it0-x232.google.com (mail-it0-x232.google.com [IPv6:2607:f8b0:4001:c0b::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2AFA130F6C for <oauth@ietf.org>; Tue, 17 Jul 2018 07:22:41 -0700 (PDT)
Received: by mail-it0-x232.google.com with SMTP id q20-v6so2144151ith.0 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:22:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=VWyEMH4uEEhfdhKAp9Wa8HnHZPtuCZ58d54bAirkeMM=; b=kTvrITWT+JCsQ5g/SieEtUb4zpRc5U4WX97x9k7FyTOSNJjFK663+gGUROXFnPHNQM /i9a/yFBcCYHKYVQeIPhi0lic8Hmi+VApzyquHvyVtGmgCf+Nuadah1xgO4PwiLYU93M wwzVJ7lR4hxkKmN5t4LRKdaHntWxiQiO0JO2o=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=VWyEMH4uEEhfdhKAp9Wa8HnHZPtuCZ58d54bAirkeMM=; b=flva5yce2JEttL7d9OMxEvSrjfPAEjkxisDjFby9yJiEwjvpBxUgO5vHYP3RV26EWF fSS7crTIaQydtsU4TcVLQhcOB+PGbcgMcCy3banesdMgjVWwKIP7USYdpQIg4W6J/4sq FXhIeSYi5/KH1NagXRO6HtlHtFt8Wkmu0npb3zZTqFrZq3MRHnyAtN87Tge2rKWlJ9Rf ftcXut9+x3aqvJCA/Wm0JWhuc7+cIrz5Mx7NphlzN6sjMJHce5VbcvivBubA1KLCKuI1 +69gdF77ZF0W1KimOgdIqxsePXzrhAULC4vVU5OOSVPsafilxCiHLeR2JQq88knNBZeT sj6Q==
X-Gm-Message-State: AOUpUlEGKqgNeiDaoiGEs+3IAW0PXA+Uiz1rpVQnoU9CUGVlwtoL0pKV kFjpYe8TN/W6x+Z4YbrkL0Q5e5lEWCCxXDzq/kuLNtB+VVAkPfou1J2fQuSNAgNvR6UaOQ/6O5e Nzsfxp6wOOG1tXTZQ
X-Google-Smtp-Source: AAOMgpeaAx+rOWAbU47g+T6Hc2IF5azoRKwJ81CAWju5rIwOVpDwN1byESn/V3bRnc0RAw4gblMg/QiZdLU4D+byShs=
X-Received: by 2002:a24:19d5:: with SMTP id b204-v6mr1713991itb.25.1531837360913;  Tue, 17 Jul 2018 07:22:40 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Tue, 17 Jul 2018 07:22:10 -0700 (PDT)
In-Reply-To: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
References: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 17 Jul 2018 08:22:10 -0600
Message-ID: <CA+k3eCSCoSpzhQxZiUC8mxR=ujaAxqxi09wiR4J_cXi5fiXTmQ@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c05d30057132ad58"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/51cZkqByx-VSrcl7E2i5gn2aWoc>
Subject: Re: [OAUTH-WG] MTLS - IPR Disclosure
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:22:54 -0000

--000000000000c05d30057132ad58
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

 I am not aware of any IPR that pertains to the OAuth MTLS document.

On Tue, Jul 17, 2018 at 8:07 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Authors,
>
> As part of the write-up for the OAuth MTLS document, we need an IPR
> disclosure from all of you..
>
> Are you aware of any IPR related to the following OAuth MTLS document?
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>
> Regards,
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000c05d30057132ad58
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">

<span></span>I am not aware of any IPR that pertains to the OAuth MTLS docu=
ment.<br></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On=
 Tue, Jul 17, 2018 at 8:07 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a =
href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.c=
om</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"=
><div>Authors,</div><div><br></div><div>As part of the write-up for the OAu=
th MTLS document, we need an IPR disclosure from all of you..</div><div><br=
></div><div>Are you aware of any IPR related to the following OAuth MTLS do=
cument?</div><div><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oa=
uth-mtls/" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-ie=
tf-oauth-mtls/</a></div><div><br></div><div>Regards,</div><div><br></div></=
div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000c05d30057132ad58--


From nobody Tue Jul 17 07:24:41 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCC2412D7F8 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:24:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HZUy9etfh0Lq for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:24:33 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3CB60130E05 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:24:33 -0700 (PDT)
Received: from [84.158.233.58] (helo=[192.168.71.123]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1ffQty-0002Yo-VT; Tue, 17 Jul 2018 16:24:31 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <5D3C91EA-B760-4B6D-AECA-C1022AC0086D@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_004E4154-B5E8-44C9-B4B9-C0DB98552870"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 17 Jul 2018 16:24:28 +0200
In-Reply-To: <CABzCy2BoOCzb8uMVAzq0ZdFXjtBajMt-8JHyM8s5r3SGqkc89w@mail.gmail.com>
Cc: oauth <oauth@ietf.org>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
References: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com> <CABzCy2BoOCzb8uMVAzq0ZdFXjtBajMt-8JHyM8s5r3SGqkc89w@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/D-Zllrr6eLJryR8n97EcXw3p46o>
Subject: Re: [OAUTH-WG] MTLS - IPR Disclosure
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:24:40 -0000

--Apple-Mail=_004E4154-B5E8-44C9-B4B9-C0DB98552870
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

I=E2=80=99m not aware of any IPR re the OAuth mTLS draft.

> Am 17.07.2018 um 16:11 schrieb Nat Sakimura <sakimura@gmail.com>:
>=20
> Not that I am aware of.=20
>=20
> On Tue, Jul 17, 2018 at 11:06 PM Rifaat Shekh-Yusef =
<rifaat.ietf@gmail.com> wrote:
> Authors,
>=20
> As part of the write-up for the OAuth MTLS document, we need an IPR =
disclosure from all of you..
>=20
> Are you aware of any IPR related to the following OAuth MTLS document?
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/
>=20
> Regards,
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> --=20
> Nat Sakimura (=3Dnat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_004E4154-B5E8-44C9-B4B9-C0DB98552870
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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=
--Apple-Mail=_004E4154-B5E8-44C9-B4B9-C0DB98552870--


From nobody Tue Jul 17 07:37:23 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75F3C130F13 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:37:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wj2tgFNgLlux for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:37:06 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10089.outbound.protection.outlook.com [40.107.1.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93A27130FE6 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:37:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=V5703Emw33ctBGgWwuIDz52q6FD72UG+x14mJDUGF1A=; b=K9akD8vFcM57Z3nEA4tI3UHXjAOxWl49HMUGhrvdglrjuwyeVd3QxNls2356dbO3jew6CPq6VcglKxIFOfoY8ZvaVVJ5cgdd+bJUNd1h/5pZB3L0Go5TYEJVtnP4VLrLGEbwKiuM8kewEfK9E1PQHeP5t6HTEVqbDCtkLl2jehk=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1357.eurprd08.prod.outlook.com (10.167.198.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.17; Tue, 17 Jul 2018 14:36:57 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Tue, 17 Jul 2018 14:36:57 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Shepherd Write-Up for draft-ietf-oauth-jwt-bcp-03
Thread-Index: AdQd243I2U3qEYbEQXmZVxaA14ytWw==
Date: Tue, 17 Jul 2018 14:36:57 +0000
Message-ID: <VI1PR0801MB21128CDA3248DA6B22651CE7FA5C0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1357; 7:sk2O30tc5Rvra6K1H3NRh7NNZU1oL9OMmTVu8gG+/TUOdU512wARJAh0pGFmNgIlidZNHFcy0TscsvudHTc78hgUm9nham39KPoUFWd54G+cMCgxKOXvUAUWffwzOBsp/F83gi1shgfWy3JPX9WZ1m4eN/S24tTCSFZaIGAxFMfUPmKrAlDbB8r3DT9SrXVfCf/9kxmAZjBfZhh5cPAEQXzFPQCeJ5+GEF6njObcWVWt4sQyc5iwUbs6lmtNFFSb
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 001bdc65-b14b-418a-ebb3-08d5ebf2bfce
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(48565401081)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1357; 
x-ms-traffictypediagnostic: VI1PR0801MB1357:
x-microsoft-antispam-prvs: <VI1PR0801MB13577E0A7AD15217A19E6790FA5C0@VI1PR0801MB1357.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(223705240517415);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1357; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1357; 
x-forefront-prvs: 073631BD3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(136003)(346002)(366004)(39860400002)(376002)(40434004)(53754006)(189003)(199004)(33656002)(9686003)(5640700003)(97736004)(6306002)(476003)(6436002)(3846002)(6116002)(2501003)(72206003)(68736007)(14454004)(53936002)(55016002)(486006)(478600001)(305945005)(5660300001)(966005)(74316002)(7736002)(6916009)(66066001)(2900100001)(316002)(81156014)(1730700003)(8676002)(7696005)(25786009)(86362001)(81166006)(2906002)(186003)(99286004)(102836004)(2351001)(8936002)(105586002)(5250100002)(106356001)(26005)(6506007)(14444005)(256004)(5024004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1357; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Y8do+vV/AIS9Je4kax52H/ujaTi39dEmrJgQZdIkWAQ4/Tzv7vR7pGkZ8U2va5+IFA5Pao1MjHZ4aSPgfITnHd0FT72I9QIyn5viFBtFokkvr6NrDiii6eOff0EXOuXn54uBU0yca7N4IqTrVuLGD0K9+eIpG0vzyp6/Fpvzd2yQ0r1mHVpaKxGN5P7uRAUo9wKW35WhExO2cnGWBO3QBjkjXz9atLY4AZ5DmVXWjvwBNJ/TjTll5S55mcRKQZ0OuKMWX1ufvS8Vulb+iBRvCsJ2Y2EPuUZAhbRxsjV9oHKbROLzonxwHPsjYAvI0XBpDlvZhNm94XZv+hHjt5p8OTCfRA/6LVeY1MPmq8QUaIc=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 001bdc65-b14b-418a-ebb3-08d5ebf2bfce
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2018 14:36:57.4504 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1357
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ktEwJo23KKfLYbL8h0WXBmR2Q6k>
Subject: [OAUTH-WG] Shepherd Write-Up for draft-ietf-oauth-jwt-bcp-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:37:22 -0000

Hi all,

Here is the shepherd write-up for draft-ietf-oauth-jwt-bcp-03: https://data=
tracker.ietf.org/doc/draft-ietf-oauth-jwt-bcp/shepherdwriteup/

Feedback appreciated.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.


From nobody Tue Jul 17 07:57:51 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23504130FA3 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:57:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3olJ95KRMBTC for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 07:57:26 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64BED130F18 for <oauth@ietf.org>; Tue, 17 Jul 2018 07:57:19 -0700 (PDT)
Received: from [84.158.233.58] (helo=[192.168.71.123]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1ffRPg-0000PZ-EA; Tue, 17 Jul 2018 16:57:16 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <F399049B-C36E-4014-8717-B82270A2EBF8@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_8AE21BD8-6EA5-4E77-9D27-00ACA47FC537"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 17 Jul 2018 16:57:13 +0200
In-Reply-To: <153021689405.18540.5214482725778765448@ietfa.amsl.com>
Cc: oauth <oauth@ietf.org>
To: William Denniss <wdenniss@google.com>
References: <153021689405.18540.5214482725778765448@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/vAhoFUti72f4ypN2tSlH4Me9Aig>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-incremental-authz-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 14:57:48 -0000

--Apple-Mail=_8AE21BD8-6EA5-4E77-9D27-00ACA47FC537
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi William,=20

please find below my review feedback.

First of all, I think you managed to come up with the minimal extension =
needed to address a very relevant use case. Thanks!

- Section 5, last paragraph.=20

"the new refresh token issued in the Access Token Response (Section =
4.1.4 of ) SHOULD include authorization for the scopes in the previous =
grant.=E2=80=9C

Wouldn=E2=80=99t it be better to make that a MUST? Otherwise the client =
must assume the AS decides to not include all previously granted scopes, =
which in turn means the client must keep older grants (and hope the AS =
dd not automatically revolve it).

- Section 6.1.1

The section describes how a client should handle denial for incremental =
authorizations. How is the AS supposed to handle it? =46rom the text one =
could deduce the AS should not discard any pre-existing granted scopes. =
Is that correct? Would it make sense to explicitly state that?

kind regards,
Torsten.=20


> Am 28.06.2018 um 22:14 schrieb internet-drafts@ietf.org:
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> This draft is a work item of the Web Authorization Protocol WG of the =
IETF.
>=20
>        Title           : OAuth 2.0 Incremental Authorization
>        Author          : William Denniss
> 	Filename        : draft-ietf-oauth-incremental-authz-00.txt
> 	Pages           : 8
> 	Date            : 2018-06-28
>=20
> Abstract:
>   OAuth 2.0 authorization requests that include every scope the client
>   might ever need can result in over-scoped authorization and a sub-
>   optimal end-user consent experience.  This specification enhances =
the
>   OAuth 2.0 authorization protocol by adding incremental =
authorization,
>   the ability to request specific authorization scopes as needed, when
>   they're needed, removing the requirement to request every possible
>   scope that might be needed upfront.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
>=20
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-oauth-incremental-authz-00
> =
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-incremental-authz-0=
0
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_8AE21BD8-6EA5-4E77-9D27-00ACA47FC537
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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=
--Apple-Mail=_8AE21BD8-6EA5-4E77-9D27-00ACA47FC537--


From nobody Tue Jul 17 08:22:56 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B630130F73 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 08:22:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YJxAMMDEHyXO for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 08:22:43 -0700 (PDT)
Received: from smtprelay07.ispgateway.de (smtprelay07.ispgateway.de [134.119.228.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4838E126DBF for <oauth@ietf.org>; Tue, 17 Jul 2018 08:22:43 -0700 (PDT)
Received: from [84.158.233.58] (helo=[192.168.71.123]) by smtprelay07.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1ffRoG-0006XG-JI; Tue, 17 Jul 2018 17:22:40 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <52D0886F-C7B3-4F98-B1CE-70E8406656D5@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_AED7E529-88B6-4282-A411-357EB2AA4767"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 17 Jul 2018 17:22:37 +0200
In-Reply-To: <152719369843.5001.6781345939306593672@ietfa.amsl.com>
Cc: oauth <oauth@ietf.org>
To: Dick Hardt <dick.hardt@gmail.com>
References: <152719369843.5001.6781345939306593672@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/r1APfcrclYA7Ru84XsUBu-_tEHE>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-reciprocal-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 15:22:55 -0000

--Apple-Mail=_AED7E529-88B6-4282-A411-357EB2AA4767
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Dick,

I gave you draft a read and came up with the following questions:

Section 2: How does Party A know it is supposed to conduct a reciprocal =
OAuth flow if Party B does not indicate so in the authorization =
response?

Section 3

Party A is supposed to call the token endpoint of Party B using an =
authorization code generated by Party A. How does Party B interpret this =
code? Or does it just send this code back to Party A to obtain its =
access token for A?

Party B uses the access token issued to Party A in the first part of the =
flow (ordinary OAuth code flow) to identify the respective user account =
with Party B. Since the AS consumes its access token as an RS, does =
Party A need to include a certain scope in the code flow request in =
order to enable this part of the flow?

How is the AS of Party B supposed to determine the token endpoint of =
Party A=E2=80=99s AS?

I think a figure of the overall process would help to understand the =
concept.=20

kind regards,
Torsten.=20

> Am 24.05.2018 um 22:28 schrieb internet-drafts@ietf.org:
>=20
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> This draft is a work item of the Web Authorization Protocol WG of the =
IETF.
>=20
>        Title           : Reciprocal OAuth
>        Author          : Dick Hardt
> 	Filename        : draft-ietf-oauth-reciprocal-00.txt
> 	Pages           : 4
> 	Date            : 2018-05-24
>=20
> Abstract:
>   There are times when a user has a pair of protected resources that
>   would like to request access to each other.  While OAuth flows
>   typically enable the user to grant a client access to a protected
>   resource, granting the inverse access requires an additional flow.
>   Reciprocal OAuth enables a more seamless experience for the user to
>   grant access to a pair of protected resources.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>=20
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00
> https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reciprocal-00
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_AED7E529-88B6-4282-A411-357EB2AA4767
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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=
--Apple-Mail=_AED7E529-88B6-4282-A411-357EB2AA4767--


From nobody Tue Jul 17 09:00:01 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9129E130DCA for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 08:59:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HL5e9qetenZY for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 08:59:57 -0700 (PDT)
Received: from smtprelay08.ispgateway.de (smtprelay08.ispgateway.de [134.119.228.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E19B124BE5 for <oauth@ietf.org>; Tue, 17 Jul 2018 08:59:57 -0700 (PDT)
Received: from [84.158.233.58] (helo=[192.168.71.123]) by smtprelay08.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1ffSOI-0005VU-VG; Tue, 17 Jul 2018 17:59:55 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_BF7BDCF7-4A79-4892-9236-022C07C1AA02"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 17 Jul 2018 17:59:52 +0200
In-Reply-To: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com>
Cc: oauth@ietf.org
To: Dick Hardt <dick.hardt@gmail.com>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Wo3kmJK0BCGWmWMfLWZ-KBAuzBc>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 16:00:00 -0000

--Apple-Mail=_BF7BDCF7-4A79-4892-9236-022C07C1AA02
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Dick,

I like the draft! It puts together some best practices relevant for =
dynamic OAuth in a reasonable way.

Some comments:=20

Section 2:=20
I appreciate the idea to let the resource determine its resource URI =
(later used as aud of the access token). This will allow the RS to =
segment and group its resources as needed.

Section 3:=20
Don=E2=80=99t you think it could be a useful information to have the =
resource URI available in the authorization flow?I would assume it could =
have some additional meaning to the AS and could also be the context of =
the scope.

Section 4:=20
I think the client MUST authenticate using a PoP (asymmetric crypto =
based) mechanisms due to the attack angle given in 6.3
Did you intentionally restricted the draft to single resources? I would =
desire support for an integrated UI flow for authorizing access to =
multiple resources at once. This makes sense in multi-service =
deployments.

Section 6.1.=20
I suggest you also refer to =
https://tools.ietf.org/html/draft-ietf-oauth-security-topics-06#section-3.=
7 for a comprehensive discussion of this threat.

kind regards,
Torsten.  =20


> Am 12.06.2018 um 21:28 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> Hey OAuth WG
>=20
> I have worked with Nat and Brian to merge our concepts and those are =
captured in the updated draft.
>=20
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>=20
> We are hopeful the WG will adopt this draft as a WG document.
>=20
> Any comments and feedback are welcome!
>=20
> /Dick
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_BF7BDCF7-4A79-4892-9236-022C07C1AA02
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIILKDCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggXmMIIDzqADAgECAhBqm+E4O/8ra58B1dm4p1JW
MA0GCSqGSIb3DQEBDAUAMIGFMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDErMCkGA1UE
AxMiQ09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xMzAxMTAwMDAwMDBaFw0y
ODAxMDkyMzU5NTlaMIGXMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy
MRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0
Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTCCASIw
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL6znlesKHZ1QBbHOAOY08YYdiFQ8yV5C0y1oNF9
Olg+nKcxLqf2NHbZhGra0D00SOTq9bus3/mxgUsg/Wh/eXQ0pnp8tZ8XZWAnlyKMpjL+qUByRjXC
A6RQyDMqVaVUkbIr5SU0RDX/kSsKwer3H1pT/HUrBN0X8sKtPTdGX8XAWt/VdMLBrZBlgvnkCos+
KQWWCo63OTTqRvaq8aWccm+KOMjTcE6s2mj6RkalweyDI7X+7U5lNo6jzC8RTXtVV4/Vwdax720Y
pMPJQaDaElmOupyTf1Qib+cpukNJnQmwygjD8m046DQkLnpXNCAGjuJy1F5NATksUsbfJAr7FLUC
AwEAAaOCATwwggE4MB8GA1UdIwQYMBaAFLuvfgI9+qbxPISOre44mOzZMjLUMB0GA1UdDgQWBBSC
r2yM+MX+lmF86B89K3FIXsSLwDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAR
BgNVHSAECjAIMAYGBFUdIAAwTAYDVR0fBEUwQzBBoD+gPYY7aHR0cDovL2NybC5jb21vZG9jYS5j
b20vQ09NT0RPUlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwcQYIKwYBBQUHAQEEZTBjMDsG
CCsGAQUFBzAChi9odHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FBZGRUcnVzdENBLmNy
dDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMA0GCSqGSIb3DQEBDAUAA4IC
AQB4XLKBKDRPPO5fVs6fl1bsj6JrF/bz9kkIBtTYLzXN30D+03Hj6OxCDBEaIeNmsBhrJmuubvyE
7HtoSmR809AgcYboW+rcTNZ/8u/Hv+GTrNI/AhqX2/kiQNxmgUPt/eJPs92Qclj0HnVyy9TnSvGk
SDU7I5Px+TbO+88G4zipA2psZaWeEykgzClZlPz1FjTCkk77ZXp5cQYYexE6zeeN4/0OqqoAloFr
jAF4o50YJafX8mnahjp3I2Y2mkjhk0xQfhNqbzlLWPoT3m7j7U26u7zg6swjOq8hITYc3/np5tM5
aVyu6t99p17bTbY7+1RTWBviN9YJzK8HxzObXYWBf/L+VGOYNsQDTxAk0Hbvb1j6KjUhg7fO294F
29QIhhmiNOr84JHoy+fNLpfvYc/Q9EtFOI5ISYgOxLk3nD/whbUe9rmEQXLp8MB933Ij474gwwCP
Upwv9mj2PMnXoc7mbrS22XUSeTwxCTP9bcmUdp4jmIoWfhQm7X9w/Zgddg+JZ/YnIHOwsGsaTUgj
7fIvxqith7DoJC91WJ8Lce3CVJqb1XWeKIJ84F7YLXZN0oa7TktYgDdmQVxYkZo1c5noaDKH9Oq9
cbm/vOYRUM1cWcef20Wkyk5S/GFyyPJwG0fR1nRas3DqAf4cXxMiEKcff7PNa4M3RGTqH0pWR8p6
EjGCA7owggO2AgEBMIGtMIGXMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UE
AxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIR
AJIm1HcLmC2uYhZqknoSA5UwCQYFKw4DAhoFAKCCAeEwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEH
ATAcBgkqhkiG9w0BCQUxDxcNMTgwNzE3MTU1OTUyWjAjBgkqhkiG9w0BCQQxFgQUnlFZ8o+UGiJJ
dL1arLXwGHVtd2Qwgb4GCSsGAQQBgjcQBDGBsDCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENB
IExpbWl0ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBT
ZWN1cmUgRW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMIHABgsqhkiG9w0BCRACCzGBsKCBrTCB
lzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2Fs
Zm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xp
ZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOV
MA0GCSqGSIb3DQEBAQUABIIBABk8ATLLyStDa/pBPz1ua+JbJv//nmdod0/Wn5LcvPSCW2pvymtz
nYx8v+J+0H444lXokDcPtqqb98k1gS7p8UeFBiHBL+NRv+VhMVjIdHWfBwlsh1sPv3OZ2ikv2bli
DOcC8tcxefGTSGPZ6WAtSpSvjOuWVIBRboqngR/d/gd95cYWj/4wRy/eqqk1/4zApSc5AKw6ixwi
j1CV3d8LEwD0rCbmwGPm4FxIGjpmuXVGWmXIDpO1i+IIFH/BJlYGtPq4/+V6+ZPjQxIhTFOxr8Jx
F+2suNA9oP9xsK0a3uRgQTecmH1+uahetR+McNhXQZes2zgMcEpgLutzB6R71dEAAAAAAAA=
--Apple-Mail=_BF7BDCF7-4A79-4892-9236-022C07C1AA02--


From nobody Tue Jul 17 09:01:22 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC037130E27 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 09:01:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XBvEBtteH8zq for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 09:01:17 -0700 (PDT)
Received: from mail-pf0-x229.google.com (mail-pf0-x229.google.com [IPv6:2607:f8b0:400e:c00::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96155130DCA for <oauth@ietf.org>; Tue, 17 Jul 2018 09:01:17 -0700 (PDT)
Received: by mail-pf0-x229.google.com with SMTP id d14-v6so728467pfo.3 for <oauth@ietf.org>; Tue, 17 Jul 2018 09:01:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=mA8ZbMqPh4YpLrsgSxOxWltSo98r2Zx/Z8K35Ai2KvA=; b=CH+SQslPCWvzVFijOY1UodhmA5oWfEunJzrd0wQMQnW6p0SvWis1f4aUID4LjTLmrG 9FcanDoXE4jigvaV/KKze48vVoG67sxo4mgkazio4Ruc1VHY9IRhmrS+T4Qa/TkYgn2/ Ss4WbWg5NrpRj5eKnZGAk9eKuTjTaQnDtL/mKRIXRtcTZ2o7gV4kDQrPgtXCIUEpbb2t QX20O1sSVUH3fJDVBSYRFRox/WQf8GqhwLzWbaMjCZfxQRAU87qY01xPMP09lyzJR9t9 guPurvXUuN6thVoi5+8zvwtgMMd0Q+pvKFKHBTBPi72hWlodgpIOcTEGWHsh8eaTbA6j i1Kg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=mA8ZbMqPh4YpLrsgSxOxWltSo98r2Zx/Z8K35Ai2KvA=; b=lHzLXROeXx0dKrGUdDOmRiQtoh84BrNrVBC6qdl3NqqUrnP5o8vyAIpPz8Th4/n0CY sZBqKAcZNovdZcq0R3dJS19XehaM2sDRPwsl99zz2FUx2qbROyHnBkpY5v60nWRrbu/w Ip6bcicFuhGR9uHHghQDEzQILUL+8usiV5bMw01g5mBTDURROrV0LVZqrmaDkthT33uC AxZ2q3jN6mNpMbovsb/EU1sWpBv14S11BOZA2JZpF9oPrm85a1OFv9r/WCS0SfbAHa/5 ePnq8anpSWrvOhpqmDxmgctQj3+LhTbW40n4k2CI+CrKcbFRk5PJF3wQutxc9yI0FkVg Bkig==
X-Gm-Message-State: AOUpUlE1JJuIYExRLVrS216CZshM+IutgdHkWm9hl/Y71RuLOL6tw6Y1 eQCej6BcUQum3Q4h+cU0ufpXyJJBt2CX1HSXG5w=
X-Google-Smtp-Source: AAOMgpfrXjQDtHc5e0N4IaVq8pf8m4x5YdXTbUh3VEMF6dcSB6Q88BYOoYFa//tG/ihVNrqib8XoYCdolqA7H1KTecI=
X-Received: by 2002:a63:a347:: with SMTP id v7-v6mr2106170pgn.182.1531843276959;  Tue, 17 Jul 2018 09:01:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Tue, 17 Jul 2018 09:00:56 -0700 (PDT)
In-Reply-To: <52D0886F-C7B3-4F98-B1CE-70E8406656D5@lodderstedt.net>
References: <152719369843.5001.6781345939306593672@ietfa.amsl.com> <52D0886F-C7B3-4F98-B1CE-70E8406656D5@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 17 Jul 2018 12:00:56 -0400
Message-ID: <CAD9ie-vZ8TcjUUZLzTnanXy_xNFhpRE=a-McPxyPdv=R+JUg3A@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005ff52b0571340e69"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/p5vi4Jx6kqJC78QE_Bs0EZ4Q2uU>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-reciprocal-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 16:01:21 -0000

--0000000000005ff52b0571340e69
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks for the review Torsten. All good points to be clarified in the doc.
Responses inserted ...

On Tue, Jul 17, 2018 at 11:22 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Dick,
>
> I gave you draft a read and came up with the following questions:
>
> Section 2: How does Party A know it is supposed to conduct a reciprocal
> OAuth flow if Party B does not indicate so in the authorization response?
>

Out of band configuration. Will clarify in next version.


>
> Section 3
>
> Party A is supposed to call the token endpoint of Party B using an
> authorization code generated by Party A. How does Party B interpret this
> code? Or does it just send this code back to Party A to obtain its access
> token for A?
>

Yes, per last sentence in Section 3. What language would clarify that?


>
> Party B uses the access token issued to Party A in the first part of the
> flow (ordinary OAuth code flow) to identify the respective user account
> with Party B. Since the AS consumes its access token as an RS, does Party=
 A
> need to include a certain scope in the code flow request in order to enab=
le
> this part of the flow?
>

Party A is using its own access token for context. Party B is not accessing
the user context / account.


>
> How is the AS of Party B supposed to determine the token endpoint of Part=
y
> A=E2=80=99s AS?
>

Same as Party A learns Party B's token endpoint.

In practice, the flow could be started by either party. Both can initiate
and complete. I'll clarify in the next version.


>
> I think a figure of the overall process would help to understand the
> concept.
>

It is pretty much the same as OAuth with one extra flow. I can add if that
would help.


>
> kind regards,
> Torsten.
>
> > Am 24.05.2018 um 22:28 schrieb internet-drafts@ietf.org:
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol WG of the
> IETF.
> >
> >        Title           : Reciprocal OAuth
> >        Author          : Dick Hardt
> >       Filename        : draft-ietf-oauth-reciprocal-00.txt
> >       Pages           : 4
> >       Date            : 2018-05-24
> >
> > Abstract:
> >   There are times when a user has a pair of protected resources that
> >   would like to request access to each other.  While OAuth flows
> >   typically enable the user to grant a client access to a protected
> >   resource, granting the inverse access requires an additional flow.
> >   Reciprocal OAuth enables a more seamless experience for the user to
> >   grant access to a pair of protected resources.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00
> > https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reciprocal-00
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>

--0000000000005ff52b0571340e69
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks for the review Torsten. All good points to be clari=
fied in the doc. Responses inserted ...<div class=3D"gmail_extra"><br><div =
class=3D"gmail_quote">On Tue, Jul 17, 2018 at 11:22 AM, Torsten Lodderstedt=
 <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D=
"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">Hi Dick,<br>
<br>
I gave you draft a read and came up with the following questions:<br>
<br>
Section 2: How does Party A know it is supposed to conduct a reciprocal OAu=
th flow if Party B does not indicate so in the authorization response?<br><=
/blockquote><div><br></div><div>Out of band configuration. Will clarify in =
next version.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3<br>
<br>
Party A is supposed to call the token endpoint of Party B using an authoriz=
ation code generated by Party A. How does Party B interpret this code? Or d=
oes it just send this code back to Party A to obtain its access token for A=
?<br></blockquote><div><br></div><div>Yes, per last sentence in Section 3. =
What language would clarify that?</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<br>
Party B uses the access token issued to Party A in the first part of the fl=
ow (ordinary OAuth code flow) to identify the respective user account with =
Party B. Since the AS consumes its access token as an RS, does Party A need=
 to include a certain scope in the code flow request in order to enable thi=
s part of the flow?<br></blockquote><div><br></div><div>Party A is using it=
s own access token for context. Party B is not accessing the user context /=
 account.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
How is the AS of Party B supposed to determine the token endpoint of Party =
A=E2=80=99s AS?<br></blockquote><div><br></div><div>Same as Party A learns =
Party B&#39;s token endpoint.</div><div><br></div><div>In practice, the flo=
w could be started by either party. Both can initiate and complete. I&#39;l=
l clarify in the next version.</div><div>=C2=A0</div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">
<br>
I think a figure of the overall process would help to understand the concep=
t. <br></blockquote><div><br></div><div>It is pretty much the same as OAuth=
 with one extra flow. I can add if that would help.</div><div>=C2=A0</div><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">
<br>
kind regards,<br>
Torsten. <br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; Am 24.05.2018 um 22:28 schrieb <a href=3D"mailto:internet-drafts@ietf.=
org">internet-drafts@ietf.org</a>:<br>
&gt; <br>
&gt; <br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol WG of the =
IETF.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: Reciprocal OAuth<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : =
Dick Hardt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-=
ietf-oauth-reciprocal-<wbr>00.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: 4<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 : 2018-05-24<br>
&gt; <br>
&gt; Abstract:<br>
&gt;=C2=A0 =C2=A0There are times when a user has a pair of protected resour=
ces that<br>
&gt;=C2=A0 =C2=A0would like to request access to each other.=C2=A0 While OA=
uth flows<br>
&gt;=C2=A0 =C2=A0typically enable the user to grant a client access to a pr=
otected<br>
&gt;=C2=A0 =C2=A0resource, granting the inverse access requires an addition=
al flow.<br>
&gt;=C2=A0 =C2=A0Reciprocal OAuth enables a more seamless experience for th=
e user to<br>
&gt;=C2=A0 =C2=A0grant access to a pair of protected resources.<br>
&gt; <br>
&gt; <br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciproca=
l/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>=
doc/draft-ietf-oauth-<wbr>reciprocal/</a><br>
&gt; <br>
&gt; There are also htmlized versions available at:<br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draf=
t-ietf-oauth-reciprocal-00</a><br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reci=
procal-00" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/<wbr>doc/html/draft-ietf-oauth-<wbr>reciprocal-00</a><br>
&gt; <br>
&gt; <br>
&gt; Please note that it may take a couple of minutes from the time of subm=
ission<br>
&gt; until the htmlized version and diff are available at <a href=3D"http:/=
/tools.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<b=
r>
&gt; <br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" tar=
get=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>=
<br>
<br>
</div></div></blockquote></div><br></div></div>

--0000000000005ff52b0571340e69--


From nobody Tue Jul 17 09:17:25 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECCC1130F2C for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 09:17:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a6e9awp_m0TM for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 09:17:09 -0700 (PDT)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FB88130E7F for <oauth@ietf.org>; Tue, 17 Jul 2018 09:17:09 -0700 (PDT)
Received: by mail-pg1-x52e.google.com with SMTP id e6-v6so659896pgv.2 for <oauth@ietf.org>; Tue, 17 Jul 2018 09:17:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=UNB18PmKjlRcWmRxYDj/iej+4WcYtuevuGFU8nneBTY=; b=F2ow6a/Qf+yKfvgne9FcogOaZuSvsOQVVB1O4xZQttk4zlvWA36dz437VNs3DEhp8L vVqQGh1jqIy9uyRZsSJ07JlIY2nSNE1O6jyDx9d7GPlRQhKe0rmddJp7lMlUB7tcxGdT HnZwB25AK99tKH3iEuvQTA/yHqyTDgsIhYXPkUyiZkY/h59Pu+XwodIUgsxUbw95zrmp v2xk/p3zOBB67+Qze4Dc2qEoMsvloP0I2gsdrh5cSxIYTGnxMp5GDxErIdzHZ8/pX/Q7 Wi/igNmtlYIRxsb/6qNykrj/pTqYLKZpxYv9BT3QQ9L0ZWJZn/ClpJN9p3ReYWz7k0c5 4E6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=UNB18PmKjlRcWmRxYDj/iej+4WcYtuevuGFU8nneBTY=; b=iCRNChM9vvH4Y7nioCt6GXOtxIRTS+rnpOUS7jB+hwjYNyYyoLBRSJOluWHQzMKGAx I5+bQ+SjourFbxH0qLLjdvLNGwetXlQTfgqtQdxzn494Xptase8jM6iGENaUCnNJoTgV cXjHGgAj44G0+H/7WDEvapr1K4lnx9DuYS6bS7lzE1hkhG7KPVVo6ZOCU1FWhG/Mry1H licix+JGJ9+82EMQW+s6jSL3JgkPpwLQKV6HV7w7sfL2Y899fn4DWJNCQ7dRX3cNB5+P lWWIqTdnZaYw/CGXlrxV7nbHWWRZ0z3bQNtANKS+4ww9YSlNPn2GEr/Lo3SVTFBb7mfQ UgrQ==
X-Gm-Message-State: AOUpUlFEeMOzyVF6kt/Ql9u36L2iaxqHn+QwEqeLg8nHrgWmk/qXkpzx WHJem4Hoijc7/O4kOZqEThMz5VbLcBTL2wb0Bco=
X-Google-Smtp-Source: AAOMgpeVHFdGbrKvrBwoPDKoGb2mvwV4rjgpIaVGpJMNUz+om3A/KVZT+bEzmTLKt02PmDr8B4OtLKc3xVDNVM9J9nM=
X-Received: by 2002:a63:6243:: with SMTP id w64-v6mr2204033pgb.179.1531844228400;  Tue, 17 Jul 2018 09:17:08 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Tue, 17 Jul 2018 09:16:47 -0700 (PDT)
In-Reply-To: <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 17 Jul 2018 12:16:47 -0400
Message-ID: <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="00000000000015cbab0571344714"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/DODSkjKa4rgf19Mf4J_NRCv-wEg>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 16:17:24 -0000

--00000000000015cbab0571344714
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks for the review Torsten! ... comments inserted ...

On Tue, Jul 17, 2018 at 11:59 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Dick,
>
> I like the draft! It puts together some best practices relevant for
> dynamic OAuth in a reasonable way.
>
> Some comments:
>
> Section 2:
> I appreciate the idea to let the resource determine its resource URI
> (later used as aud of the access token). This will allow the RS to segmen=
t
> and group its resources as needed.
>

:)


>
> Section 3:
> Don=E2=80=99t you think it could be a useful information to have the reso=
urce URI
> available in the authorization flow?I would assume it could have some
> additional meaning to the AS and could also be the context of the scope.
>

I'm assuming you are referring to the Authorization Code Grant. Good call
out that the resource URI would be useful in the redirect.

The use cases that I have been working with have all been Client Credential
Grants

I currently don't know of a real world use case for the Authorization Code
Grant for Distributed OAuth.


>
> Section 4:
> I think the client MUST authenticate using a PoP (asymmetric crypto based=
)
> mechanisms due to the attack angle given in 6.3
> Did you intentionally restricted the draft to single resources?


yes


> I would desire support for an integrated UI flow for authorizing access t=
o
> multiple resources at once. This makes sense in multi-service deployments=
.
>

It could be. Would be great to get some real use cases for that in an
Authorization Code Grant.


>
> Section 6.1.
> I suggest you also refer to https://tools.ietf.org/html/
> draft-ietf-oauth-security-topics-06#section-3.7 for a comprehensive
> discussion of this threat.
>

Thanks


>
> kind regards,
> Torsten.
>
>
> > Am 12.06.2018 um 21:28 schrieb Dick Hardt <dick.hardt@gmail.com>:
> >
> > Hey OAuth WG
> >
> > I have worked with Nat and Brian to merge our concepts and those are
> captured in the updated draft.
> >
> > https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
> >
> > We are hopeful the WG will adopt this draft as a WG document.
> >
> > Any comments and feedback are welcome!
> >
> > /Dick
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>

--00000000000015cbab0571344714
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks for the review Torsten! ... comments inserted ...=
=C2=A0<br><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue,=
 Jul 17, 2018 at 11:59 AM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.=
net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
I like the draft! It puts together some best practices relevant for dynamic=
 OAuth in a reasonable way.<br>
<br>
Some comments: <br>
<br>
Section 2: <br>
I appreciate the idea to let the resource determine its resource URI (later=
 used as aud of the access token). This will allow the RS to segment and gr=
oup its resources as needed.<br></blockquote><div><br></div><div>:)</div><d=
iv>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3: <br>
Don=E2=80=99t you think it could be a useful information to have the resour=
ce URI available in the authorization flow?I would assume it could have som=
e additional meaning to the AS and could also be the context of the scope.<=
br></blockquote><div><br></div><div>I&#39;m assuming you are referring to t=
he Authorization Code Grant. Good call out that the resource URI would be u=
seful in the redirect.=C2=A0</div><div><br></div><div>The use cases that I =
have been working with have all been Client Credential Grants</div><div><br=
></div><div>I currently don&#39;t know of a real world use case for the Aut=
horization Code Grant for Distributed OAuth.</div><div>=C2=A0</div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex">
<br>
Section 4: <br>
I think the client MUST authenticate using a PoP (asymmetric crypto based) =
mechanisms due to the attack angle given in 6.3<br>
Did you intentionally restricted the draft to single resources? </blockquot=
e><div><br></div><div>yes</div><div>=C2=A0</div><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">I would desire support for an integrated UI flow for authorizing access=
 to multiple resources at once. This makes sense in multi-service deploymen=
ts.<br></blockquote><div><br></div><div>It could be. Would be great to get =
some real use cases for that in an Authorization Code Grant.</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex">
<br>
Section 6.1. <br>
I suggest you also refer to <a href=3D"https://tools.ietf.org/html/draft-ie=
tf-oauth-security-topics-06#section-3.7" rel=3D"noreferrer" target=3D"_blan=
k">https://tools.ietf.org/html/<wbr>draft-ietf-oauth-security-<wbr>topics-0=
6#section-3.7</a> for a comprehensive discussion of this threat.<br></block=
quote><div><br></div><div>Thanks</div><div>=C2=A0</div><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding=
-left:1ex">
<br>
kind regards,<br>
Torsten.=C2=A0 =C2=A0<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
&gt; Am 12.06.2018 um 21:28 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.h=
ardt@gmail.com">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Hey OAuth WG<br>
&gt; <br>
&gt; I have worked with Nat and Brian to merge our concepts and those are c=
aptured in the updated draft.<br>
&gt; <br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distribu=
ted/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wb=
r>doc/draft-hardt-oauth-<wbr>distributed/</a><br>
&gt; <br>
&gt; We are hopeful the WG will adopt this draft as a WG document.<br>
&gt; <br>
&gt; Any comments and feedback are welcome!<br>
&gt; <br>
&gt; /Dick<br>
</div></div><div class=3D"HOEnZb"><div class=3D"h5">&gt; __________________=
____________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>=
<br>
<br>
</div></div></blockquote></div><br></div></div>

--00000000000015cbab0571344714--


From nobody Tue Jul 17 10:33:41 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 201D4130F13 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 10:33:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v1stRUabdF_e for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 10:33:34 -0700 (PDT)
Received: from mail-vk0-x232.google.com (mail-vk0-x232.google.com [IPv6:2607:f8b0:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CB0B130FAE for <oauth@ietf.org>; Tue, 17 Jul 2018 10:33:33 -0700 (PDT)
Received: by mail-vk0-x232.google.com with SMTP id e139-v6so1020369vkf.6 for <oauth@ietf.org>; Tue, 17 Jul 2018 10:33:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=dJVOetSbEpFJI1i7O+DwKiGBJ0p3zkBiZO5a2dmoaiQ=; b=tQaXFyUixiRjEOPgSLB8q5GN6xgla9QnJCb0ZR+oP7Zz54ChOVI0EACwjiY0Oh2XsM 2fxb9zhFcqMmLvjPMKX6HbJY0g2hS9dwi9JnWoBW3F22laXNqyTv9nDFhQd5DPZq0SeZ M77ZgtJwyN0B4Csl9L7BJnvq/BCEuXPqYup/SlU+QVbTb+GFG1u4fAC3hLVKhYhCQ7yt EnjCbeBzPao1qomUSgcFHuww/QsQDGjTRsPgRyi1bnkrL2oRVf98uYsndG1DLbCAg+t0 j5fyIunbX7xPvolow2Lzv+fNdettt3JSlmsxCBu57sC9I/t/glTGP6SDVchM9V5T4P5/ KQUA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=dJVOetSbEpFJI1i7O+DwKiGBJ0p3zkBiZO5a2dmoaiQ=; b=ffXuBe3c3QEaUSaFro6wioAmbX1ldmEHkqKsqgOV3YJ3I0rCPgimGZZImOXUhigxgC XWuBwxx1rpfaKvvZrcxxbs17hdy9fkKelH6NFlD2VhNz81F+sMs9ghAQwXs1f2vG4J7F 2fLqknLTEmPH/Ke/dODHqmjjIHHmfWEVl95igHQvD2bQRdYP+btzZXjtVhhDGhoOH6eR uRZiEBqtIVWO7xEGWdV6mCIeDL41wRR3TrFiezgw/y1HUhNfcsF9OAPFHu3a8yL/4r8C z9D/CjxqCSMT96wk16m2De87FyN9AyVnckgW7y1bUdR/yhBisFGNZw4bdXkTaP6ICnEb RNOg==
X-Gm-Message-State: AOUpUlH9PO5l9EFzPEL7On7/cOVCspI1JAMc6VKOz7y3tx/5MKOFNWio yJhFvpBoqgdh7hw2lWfG9kAZMXpxD/wc4QYgI1H7PemcI04=
X-Google-Smtp-Source: AAOMgpcS2d+gdXNah9GchIkhni3ZUnXymhgPNFNm7s+30uIWFFQSklgjuWuPaiRpZv/ttGaNtb/8Rb3Z5LkSAnMAFRA=
X-Received: by 2002:a1f:6b11:: with SMTP id g17-v6mr1464693vkc.82.1531848811874;  Tue, 17 Jul 2018 10:33:31 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Tue, 17 Jul 2018 10:33:11 -0700 (PDT)
In-Reply-To: <F399049B-C36E-4014-8717-B82270A2EBF8@lodderstedt.net>
References: <153021689405.18540.5214482725778765448@ietfa.amsl.com> <F399049B-C36E-4014-8717-B82270A2EBF8@lodderstedt.net>
From: William Denniss <wdenniss@google.com>
Date: Tue, 17 Jul 2018 10:33:11 -0700
Message-ID: <CAAP42hCDH3bGiiyLX47SyKha1PnwhMLws=_25bTYj1pEz6at4g@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000048965c05713558ce"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/GrQPTPLwoij9vCOhJ-6VSPAv-6o>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-incremental-authz-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 17:33:37 -0000

--00000000000048965c05713558ce
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

On Tue, Jul 17, 2018 at 7:57 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi William,
>
> please find below my review feedback.
>
> First of all, I think you managed to come up with the minimal extension
> needed to address a very relevant use case. Thanks!
>

Glad you like it! Thanks for reviewing.


> - Section 5, last paragraph.
>
> "the new refresh token issued in the Access Token Response (Section 4.1.4
> of ) SHOULD include authorization for the scopes in the previous grant.=
=E2=80=9C
>
> Wouldn=E2=80=99t it be better to make that a MUST? Otherwise the client m=
ust
> assume the AS decides to not include all previously granted scopes, which
> in turn means the client must keep older grants (and hope the AS dd not
> automatically revolve it).
>

I was torn about this. From a protocol perspective you're not implementing
the protocol if you don't do that, so it should be a MUST. However, we need
to be careful that we defer to the provider when it comes to what
authorization is included as this is always their discretion.  I'll think
of a better way to word this so that it can be a MUST while still not
limiting the provider's discretion.


>
> - Section 6.1.1
>
> The section describes how a client should handle denial for incremental
> authorizations. How is the AS supposed to handle it? From the text one
> could deduce the AS should not discard any pre-existing granted scopes. I=
s
> that correct? Would it make sense to explicitly state that?
>

Good point. That section is mostly talking about the client, I'll add a
section for the server. I agree, the normal behavior would not be to revoke
previously granted scopes (which is how Google implements it).

Best,
William


> > Am 28.06.2018 um 22:14 schrieb internet-drafts@ietf.org:
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Web Authorization Protocol WG of the
> IETF.
> >
> >        Title           : OAuth 2.0 Incremental Authorization
> >        Author          : William Denniss
> >       Filename        : draft-ietf-oauth-incremental-authz-00.txt
> >       Pages           : 8
> >       Date            : 2018-06-28
> >
> > Abstract:
> >   OAuth 2.0 authorization requests that include every scope the client
> >   might ever need can result in over-scoped authorization and a sub-
> >   optimal end-user consent experience.  This specification enhances the
> >   OAuth 2.0 authorization protocol by adding incremental authorization,
> >   the ability to request specific authorization scopes as needed, when
> >   they're needed, removing the requirement to request every possible
> >   scope that might be needed upfront.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-oauth-incremental-authz-00
> > https://datatracker.ietf.org/doc/html/draft-ietf-oauth-
> incremental-authz-00
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>

--00000000000048965c05713558ce
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Torsten,<br><div class=3D"gmail_extra"><br><div class=
=3D"gmail_quote">On Tue, Jul 17, 2018 at 7:57 AM, Torsten Lodderstedt <span=
 dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blan=
k">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gm=
ail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-le=
ft:1ex">Hi William, <br>
<br>
please find below my review feedback.<br>
<br>
First of all, I think you managed to come up with the minimal extension nee=
ded to address a very relevant use case. Thanks!<br></blockquote><div><br><=
/div><div>Glad you like it! Thanks for reviewing.</div><div>=C2=A0</div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">
- Section 5, last paragraph. <br>
<br>
&quot;the new refresh token issued in the Access Token Response (Section 4.=
1.4 of ) SHOULD include authorization for the scopes in the previous grant.=
=E2=80=9C<br>
<br>
Wouldn=E2=80=99t it be better to make that a MUST? Otherwise the client mus=
t assume the AS decides to not include all previously granted scopes, which=
 in turn means the client must keep older grants (and hope the AS dd not au=
tomatically revolve it).<br></blockquote><div><br></div><div>I was torn abo=
ut this. From a protocol perspective you&#39;re not implementing the protoc=
ol if you don&#39;t do that, so it should be a MUST. However, we need to be=
 careful that we defer to the provider when it comes to what authorization =
is included as this is always their discretion.=C2=A0 I&#39;ll think of a b=
etter way to word this so that it can be a MUST while still not limiting th=
e provider&#39;s=C2=A0<span style=3D"font-size:small;background-color:rgb(2=
55,255,255);text-decoration-style:initial;text-decoration-color:initial;flo=
at:none;display:inline">discretion</span>.</div><div>=C2=A0<br></div><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex">
<br>
- Section 6.1.1<br>
<br>
The section describes how a client should handle denial for incremental aut=
horizations. How is the AS supposed to handle it? From the text one could d=
educe the AS should not discard any pre-existing granted scopes. Is that co=
rrect? Would it make sense to explicitly state that?<br></blockquote><div><=
br></div><div>Good point. That section is mostly talking about the client, =
I&#39;ll add a section for the server. I agree, the normal behavior would n=
ot be to revoke previously granted scopes (which is how Google implements i=
t).</div><div><br></div><div>Best,</div><div>William</div><div><br></div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px =
#ccc solid;padding-left:1ex"><div class=3D"HOEnZb"><div class=3D"h5">
<br>
&gt; Am 28.06.2018 um 22:14 schrieb <a href=3D"mailto:internet-drafts@ietf.=
org">internet-drafts@ietf.org</a>:<br>
&gt; <br>
&gt; <br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol WG of the =
IETF.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: OAuth 2.0 Incremental Authorization<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : =
William Denniss<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-=
ietf-oauth-incremental-<wbr>authz-00.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: 8<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 : 2018-06-28<br>
&gt; <br>
&gt; Abstract:<br>
&gt;=C2=A0 =C2=A0OAuth 2.0 authorization requests that include every scope =
the client<br>
&gt;=C2=A0 =C2=A0might ever need can result in over-scoped authorization an=
d a sub-<br>
&gt;=C2=A0 =C2=A0optimal end-user consent experience.=C2=A0 This specificat=
ion enhances the<br>
&gt;=C2=A0 =C2=A0OAuth 2.0 authorization protocol by adding incremental aut=
horization,<br>
&gt;=C2=A0 =C2=A0the ability to request specific authorization scopes as ne=
eded, when<br>
&gt;=C2=A0 =C2=A0they&#39;re needed, removing the requirement to request ev=
ery possible<br>
&gt;=C2=A0 =C2=A0scope that might be needed upfront.<br>
&gt; <br>
&gt; <br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-increment=
al-authz/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/<wbr>doc/draft-ietf-oauth-<wbr>incremental-authz/</a><br>
&gt; <br>
&gt; There are also htmlized versions available at:<br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-incremental-au=
thz-00" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<w=
br>draft-ietf-oauth-incremental-<wbr>authz-00</a><br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-incr=
emental-authz-00" rel=3D"noreferrer" target=3D"_blank">https://datatracker.=
ietf.org/<wbr>doc/html/draft-ietf-oauth-<wbr>incremental-authz-00</a><br>
&gt; <br>
&gt; <br>
&gt; Please note that it may take a couple of minutes from the time of subm=
ission<br>
&gt; until the htmlized version and diff are available at <a href=3D"http:/=
/tools.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<b=
r>
&gt; <br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" tar=
get=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>=
<br>
<br>
</div></div></blockquote></div><br></div></div>

--00000000000048965c05713558ce--


From nobody Tue Jul 17 10:48:39 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9572D130FF3; Tue, 17 Jul 2018 10:48:36 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.82.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: oauth@ietf.org
Message-ID: <153184971656.12663.1610083508356735781@ietfa.amsl.com>
Date: Tue, 17 Jul 2018 10:48:36 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/VCXKquUkJykDIXSba-BjrX2TuRc>
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-mtls-10.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 17:48:37 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Web Authorization Protocol WG of the IETF.

        Title           : OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens
        Authors         : Brian Campbell
                          John Bradley
                          Nat Sakimura
                          Torsten Lodderstedt
	Filename        : draft-ietf-oauth-mtls-10.txt
	Pages           : 21
	Date            : 2018-07-17

Abstract:
   This document describes OAuth client authentication and certificate
   bound access tokens using mutual Transport Layer Security (TLS)
   authentication with X.509 certificates.  OAuth clients are provided a
   mechanism for authentication to the authorization sever using mutual
   TLS, based on either self-signed certificates or public key
   infrastructure (PKI).  OAuth authorization servers are provided a
   mechanism for binding access tokens to a client's mutual TLS
   certificate, and OAuth protected resources are provided a method for
   ensuring that such an access token presented to it was issued to the
   client presenting the token.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-oauth-mtls-10
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-mtls-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-mtls-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul 17 10:51:35 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7066613104C for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 10:51:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ydHBgXOKmsa for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 10:51:21 -0700 (PDT)
Received: from mail-io0-x22f.google.com (mail-io0-x22f.google.com [IPv6:2607:f8b0:4001:c06::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1517D131007 for <oauth@ietf.org>; Tue, 17 Jul 2018 10:51:21 -0700 (PDT)
Received: by mail-io0-x22f.google.com with SMTP id q4-v6so1736791iob.2 for <oauth@ietf.org>; Tue, 17 Jul 2018 10:51:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=A4v1dDPRupzUI0G1qukZeixvJrB69LkzAjTz42kSb1w=; b=dkKaI7OrYe00xvTdWWNYsMAuY3VPflRqs/1EE8IH3jG/kYxiLmjdBXYeuZ/Ayp+VeC B6vQvoXh4eQ9u8Y6GiUABF4V55WljqEJwaT0iJdrLDFGjrgYnKR8M5TY5apVFMash9V4 Dmnubtu+INUZJGjgu+8pozICM/+2bV3Xkzpg8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=A4v1dDPRupzUI0G1qukZeixvJrB69LkzAjTz42kSb1w=; b=TgUuzLkL+G4KmzHw9tKAkmiqU01R/B8Bww4qZEFKYg7lFAKTOyTjkYjP6k9piW6rmb nxxWX4yrpJD3zF1KdR1YZ/Nu1/JfT529l0kI5ZpjLMKuaBGGfFX8h3Ph6ibB/OCUiYG7 w6SUvKunGmGx6mZrULtSjblc6S8TxVuDJyBZ3gYfRPbBB8pJRmKldFXOj1WUkJbwXrRb yOm41mqAXPhIS7vapreSlKn2/V4N5sgqEVVMOmjrGF+Fq2hRDdBsOGQ18sWo7MkqVIP4 97nQ7MOl36IK6WVSqjF2iVh9Q0oBUy7rvvZUvYD/lBzHnDvhmoF/jNzt8dVtBzQf+K/i qisg==
X-Gm-Message-State: AOUpUlHEl6/uzY/7KtY4e111YWR4jh0mhPyAvk++FttjqqrnKzzjXQQK WwD6RdA4PFd+L6IKFnQ1XV3YDISmuMGCFzsPQ1mySR6kdoQxP3bgQrGiJAB6dSnkNMNSveyfSrQ 6HWiFnBN2fLYZ/cQp
X-Google-Smtp-Source: AA+uWPxSDowAUuxqwTDdH3pWH/bNGfKpjdfApgEREmU6hDw+ydEdlj7TVyP6lq5/rl9reyjknrs5pQ+Ow+yDh97fEb4=
X-Received: by 2002:a6b:3902:: with SMTP id g2-v6mr2316940ioa.168.1531849880040;  Tue, 17 Jul 2018 10:51:20 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Tue, 17 Jul 2018 10:50:49 -0700 (PDT)
In-Reply-To: <153184971656.12663.1610083508356735781@ietfa.amsl.com>
References: <153184971656.12663.1610083508356735781@ietfa.amsl.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 17 Jul 2018 11:50:49 -0600
Message-ID: <CA+k3eCQT0agWNKndRx_24XXob3LQZp4VuwfuNTwO6RaLUx0yvw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f3132b057135971c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7u_ok7B7PLohSUa5mIZv-2tssbw>
Subject: [OAUTH-WG] Fwd:  I-D Action: draft-ietf-oauth-mtls-10.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 17:51:34 -0000

--000000000000f3132b057135971c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

-10 just updates the draft-ietf-oauth-discovery reference to RFC8414 now
that 8414 is an actual RFC

---------- Forwarded message ----------
From: <internet-drafts@ietf.org>
Date: Tue, Jul 17, 2018 at 11:48 AM
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-mtls-10.txt
To: i-d-announce@ietf.org
Cc: oauth@ietf.org



A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Web Authorization Protocol WG of the IETF.

        Title           : OAuth 2.0 Mutual TLS Client Authentication and
Certificate Bound Access Tokens
        Authors         : Brian Campbell
                          John Bradley
                          Nat Sakimura
                          Torsten Lodderstedt
        Filename        : draft-ietf-oauth-mtls-10.txt
        Pages           : 21
        Date            : 2018-07-17

Abstract:
   This document describes OAuth client authentication and certificate
   bound access tokens using mutual Transport Layer Security (TLS)
   authentication with X.509 certificates.  OAuth clients are provided a
   mechanism for authentication to the authorization sever using mutual
   TLS, based on either self-signed certificates or public key
   infrastructure (PKI).  OAuth authorization servers are provided a
   mechanism for binding access tokens to a client's mutual TLS
   certificate, and OAuth protected resources are provided a method for
   ensuring that such an access token presented to it was issued to the
   client presenting the token.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-oauth-mtls-10
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-mtls-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-mtls-10


Please note that it may take a couple of minutes from the time of submissio=
n
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000f3132b057135971c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>-10 just updates the draft-ietf-oauth-discovery refer=
ence to RFC8414 now that=C2=A08414 is an actual RFC</div><div><br></div><di=
v><div><div><div class=3D"gmail_quote">---------- Forwarded message -------=
---<br>From: <b class=3D"gmail_sendername"></b> <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt;</sp=
an><br>Date: Tue, Jul 17, 2018 at 11:48 AM<br>Subject: [OAUTH-WG] I-D Actio=
n: draft-ietf-oauth-mtls-10.txt<br>To: <a href=3D"mailto:i-d-announce@ietf.=
org">i-d-announce@ietf.org</a><br>Cc: <a href=3D"mailto:oauth@ietf.org">oau=
th@ietf.org</a><br><br><br><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Web Authorization Protocol WG of the IETF.=
<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access To=
kens<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Bria=
n Campbell<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 John Bradley<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Nat Sakimura<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Torsten Lodderstedt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-oauth-mtls-10.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 21<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2018-07-17<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document describes OAuth client authentication and certif=
icate<br>
=C2=A0 =C2=A0bound access tokens using mutual Transport Layer Security (TLS=
)<br>
=C2=A0 =C2=A0authentication with X.509 certificates.=C2=A0 OAuth clients ar=
e provided a<br>
=C2=A0 =C2=A0mechanism for authentication to the authorization sever using =
mutual<br>
=C2=A0 =C2=A0TLS, based on either self-signed certificates or public key<br=
>
=C2=A0 =C2=A0infrastructure (PKI).=C2=A0 OAuth authorization servers are pr=
ovided a<br>
=C2=A0 =C2=A0mechanism for binding access tokens to a client&#39;s mutual T=
LS<br>
=C2=A0 =C2=A0certificate, and OAuth protected resources are provided a meth=
od for<br>
=C2=A0 =C2=A0ensuring that such an access token presented to it was issued =
to the<br>
=C2=A0 =C2=A0client presenting the token.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/" rel=3D"=
noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-i=
etf-oauth-mtls/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-mtls-10" rel=3D"nor=
eferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft-ietf-oaut=
h-mtls-10</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-mtls-10" =
rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/=
html/draft-ietf-oauth-<wbr>mtls-10</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-mtls-10" re=
l=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?<wbr>url2=
=3Ddraft-ietf-oauth-mtls-10</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
<br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
</div><br></div></div></div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000f3132b057135971c--


From nobody Tue Jul 17 11:57:10 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC8C5130F24 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 11:57:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id msm2_47VrgV9 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 11:56:58 -0700 (PDT)
Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EECB130DF3 for <oauth@ietf.org>; Tue, 17 Jul 2018 11:56:58 -0700 (PDT)
Received: by mail-io0-x233.google.com with SMTP id l7-v6so1916926ioj.1 for <oauth@ietf.org>; Tue, 17 Jul 2018 11:56:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=O7vN6B2p+JlpN+dNbBRRZuzTAodHzT7jXoSuwOFOR+M=; b=aLMicLRtjU3lpwi68X3XBFmEhCpyO+RJ3tgetqh+ltAJM2aUqftduwYPFgn9N1C7jD 8RFswtjXxmNTt3RzRUiAKb2fp4EQrEoGO2bLqfYrP0xhoC9ZT6lFufMlzP8lLz8smzFz ISSRLUK+hq0O+NgXtLjfGOiLKmoZwKrdV1M+2E9fB6tXb2mYo/XO4L/MGT8dKS30gAJw JDseYwsY9ouKp/jl8hTZPhSIlnTv1zUy7U0p8S5Y81BFJ7BdQCoxX5Y4NfRM9xOx6U96 hbobMh84pz0nEebCVF9g91MGKYEuupP6mLnilsnGEG5j9pOp0+2F1z1ekhYEPPUx8qWT XN+g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=O7vN6B2p+JlpN+dNbBRRZuzTAodHzT7jXoSuwOFOR+M=; b=PyThNIxdbpq7MQr1yt2JzYvFIJT0zVhjo6/n7uVx834CIMfnVhh1EQKROUOVqdGH+t 3ItXfqtceqVQebY0yHptZlwgFcgUBXysJieY8WVClfvAkRF/3NihMrBpVtKUZ7y5mlK2 0YPAXWixXyTFcHMTHYIhyynBmjFjUV4AYhhJFQFj3N5PUF69yuAVswOErr6QY9/NM7fd f69YXbqzYHR77RnbKkUqluSodZW9ytFG2C69+jGDszo4sTBM1SgOoYfHT7tGEVzzCnsb /tt73ffOcjoQ1xSwHFWL5icSZS+VhpZjKj+h3uwlnzfmZZW/Gk+W0VYi/X+FU1zf7B7Y qDhw==
X-Gm-Message-State: AOUpUlGK0t/sI7NiO3dgBZXY1rzPPay2qZKEvgIplIwRC71K0BtnU9+J NQVQBiZivt5ZJpHJW8CK3ta3EZvWDIcmSzEpR0O2deq6
X-Google-Smtp-Source: AA+uWPzJF7IFRCtK/yGNCuZv+6HF7b2NbtCcu9k2LErBK1tN2cXoMLenlpZwFOF6OXHTn91N2i5ZPYYCsoOK/hkq+eI=
X-Received: by 2002:a6b:410a:: with SMTP id n10-v6mr2654838ioa.0.1531853817834;  Tue, 17 Jul 2018 11:56:57 -0700 (PDT)
MIME-Version: 1.0
References: <152719369843.5001.6781345939306593672@ietfa.amsl.com> <52D0886F-C7B3-4F98-B1CE-70E8406656D5@lodderstedt.net> <CAD9ie-vZ8TcjUUZLzTnanXy_xNFhpRE=a-McPxyPdv=R+JUg3A@mail.gmail.com>
In-Reply-To: <CAD9ie-vZ8TcjUUZLzTnanXy_xNFhpRE=a-McPxyPdv=R+JUg3A@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 17 Jul 2018 14:56:46 -0400
Message-ID: <CAGL6epK1bV_qCSkpCe1pHTpsSxp5_F_2zLqv-AKHNozxTXBvtQ@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: Torsten Lodderstedt <torsten@lodderstedt.net>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a8f1af05713682ae"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/HjeRTN_LMYRPo2w-8Rk3TXKUSSU>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-reciprocal-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 18:57:07 -0000

--000000000000a8f1af05713682ae
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Dick,

I too reviewed the document, and had similar questions in mind.
I agree with Torsten, a figure would make it easier to follow and
understand.

Regards,
 Rifaat


On Tue, Jul 17, 2018 at 12:01 PM Dick Hardt <dick.hardt@gmail.com> wrote:

> Thanks for the review Torsten. All good points to be clarified in the doc=
.
> Responses inserted ...
>
> On Tue, Jul 17, 2018 at 11:22 AM, Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
>> Hi Dick,
>>
>> I gave you draft a read and came up with the following questions:
>>
>> Section 2: How does Party A know it is supposed to conduct a reciprocal
>> OAuth flow if Party B does not indicate so in the authorization response=
?
>>
>
> Out of band configuration. Will clarify in next version.
>
>
>>
>> Section 3
>>
>> Party A is supposed to call the token endpoint of Party B using an
>> authorization code generated by Party A. How does Party B interpret this
>> code? Or does it just send this code back to Party A to obtain its acces=
s
>> token for A?
>>
>
> Yes, per last sentence in Section 3. What language would clarify that?
>
>
>>
>> Party B uses the access token issued to Party A in the first part of the
>> flow (ordinary OAuth code flow) to identify the respective user account
>> with Party B. Since the AS consumes its access token as an RS, does Part=
y A
>> need to include a certain scope in the code flow request in order to ena=
ble
>> this part of the flow?
>>
>
> Party A is using its own access token for context. Party B is not
> accessing the user context / account.
>
>
>>
>> How is the AS of Party B supposed to determine the token endpoint of
>> Party A=E2=80=99s AS?
>>
>
> Same as Party A learns Party B's token endpoint.
>
> In practice, the flow could be started by either party. Both can initiate
> and complete. I'll clarify in the next version.
>
>
>>
>> I think a figure of the overall process would help to understand the
>> concept.
>>
>
> It is pretty much the same as OAuth with one extra flow. I can add if tha=
t
> would help.
>
>
>>
>> kind regards,
>> Torsten.
>>
>> > Am 24.05.2018 um 22:28 schrieb internet-drafts@ietf.org:
>> >
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> > This draft is a work item of the Web Authorization Protocol WG of the
>> IETF.
>> >
>> >        Title           : Reciprocal OAuth
>> >        Author          : Dick Hardt
>> >       Filename        : draft-ietf-oauth-reciprocal-00.txt
>> >       Pages           : 4
>> >       Date            : 2018-05-24
>> >
>> > Abstract:
>> >   There are times when a user has a pair of protected resources that
>> >   would like to request access to each other.  While OAuth flows
>> >   typically enable the user to grant a client access to a protected
>> >   resource, granting the inverse access requires an additional flow.
>> >   Reciprocal OAuth enables a more seamless experience for the user to
>> >   grant access to a pair of protected resources.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>> >
>> > There are also htmlized versions available at:
>> > https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00
>> > https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reciprocal-00
>> >
>> >
>> > Please note that it may take a couple of minutes from the time of
>> submission
>> > until the htmlized version and diff are available at tools.ietf.org.
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000000000000a8f1af05713682ae
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Dick,<div><br></div><div>I too reviewed the document, a=
nd had similar questions in mind.</div><div>I agree with Torsten, a figure =
would make it easier to follow and understand.</div><div><br></div><div>Reg=
ards,</div><div>=C2=A0Rifaat</div><div><br></div></div><br><div class=3D"gm=
ail_quote"><div dir=3D"ltr">On Tue, Jul 17, 2018 at 12:01 PM Dick Hardt &lt=
;<a href=3D"mailto:dick.hardt@gmail.com">dick.hardt@gmail.com</a>&gt; wrote=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">Thanks for the r=
eview Torsten. All good points to be clarified in the doc. Responses insert=
ed ...<div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Jul=
 17, 2018 at 11:22 AM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D=
"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net<=
/a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:=
0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
I gave you draft a read and came up with the following questions:<br>
<br>
Section 2: How does Party A know it is supposed to conduct a reciprocal OAu=
th flow if Party B does not indicate so in the authorization response?<br><=
/blockquote><div><br></div><div>Out of band configuration. Will clarify in =
next version.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3<br>
<br>
Party A is supposed to call the token endpoint of Party B using an authoriz=
ation code generated by Party A. How does Party B interpret this code? Or d=
oes it just send this code back to Party A to obtain its access token for A=
?<br></blockquote><div><br></div><div>Yes, per last sentence in Section 3. =
What language would clarify that?</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<br>
Party B uses the access token issued to Party A in the first part of the fl=
ow (ordinary OAuth code flow) to identify the respective user account with =
Party B. Since the AS consumes its access token as an RS, does Party A need=
 to include a certain scope in the code flow request in order to enable thi=
s part of the flow?<br></blockquote><div><br></div><div>Party A is using it=
s own access token for context. Party B is not accessing the user context /=
 account.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
How is the AS of Party B supposed to determine the token endpoint of Party =
A=E2=80=99s AS?<br></blockquote><div><br></div><div>Same as Party A learns =
Party B&#39;s token endpoint.</div><div><br></div><div>In practice, the flo=
w could be started by either party. Both can initiate and complete. I&#39;l=
l clarify in the next version.</div><div>=C2=A0</div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">
<br>
I think a figure of the overall process would help to understand the concep=
t. <br></blockquote><div><br></div><div>It is pretty much the same as OAuth=
 with one extra flow. I can add if that would help.</div><div>=C2=A0</div><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">
<br>
kind regards,<br>
Torsten. <br>
<div class=3D"m_3921506337688083612HOEnZb"><div class=3D"m_3921506337688083=
612h5"><br>
&gt; Am 24.05.2018 um 22:28 schrieb <a href=3D"mailto:internet-drafts@ietf.=
org" target=3D"_blank">internet-drafts@ietf.org</a>:<br>
&gt; <br>
&gt; <br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol WG of the =
IETF.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: Reciprocal OAuth<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : =
Dick Hardt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-=
ietf-oauth-reciprocal-00.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: 4<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 : 2018-05-24<br>
&gt; <br>
&gt; Abstract:<br>
&gt;=C2=A0 =C2=A0There are times when a user has a pair of protected resour=
ces that<br>
&gt;=C2=A0 =C2=A0would like to request access to each other.=C2=A0 While OA=
uth flows<br>
&gt;=C2=A0 =C2=A0typically enable the user to grant a client access to a pr=
otected<br>
&gt;=C2=A0 =C2=A0resource, granting the inverse access requires an addition=
al flow.<br>
&gt;=C2=A0 =C2=A0Reciprocal OAuth enables a more seamless experience for th=
e user to<br>
&gt;=C2=A0 =C2=A0grant access to a pair of protected resources.<br>
&gt; <br>
&gt; <br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciproca=
l/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-oauth-reciprocal/</a><br>
&gt; <br>
&gt; There are also htmlized versions available at:<br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-oauth-reciprocal-00</a><br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reci=
procal-00" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-oauth-reciprocal-00</a><br>
&gt; <br>
&gt; <br>
&gt; Please note that it may take a couple of minutes from the time of subm=
ission<br>
&gt; until the htmlized version and diff are available at <a href=3D"http:/=
/tools.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<b=
r>
&gt; <br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" tar=
get=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
</div></div></blockquote></div><br></div></div>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div>

--000000000000a8f1af05713682ae--


From nobody Tue Jul 17 12:14:53 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38B91130E08 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 12:14:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DIEgB3cTucc8 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 12:14:49 -0700 (PDT)
Received: from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com [IPv6:2607:f8b0:4864:20::52c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2F5E130DF3 for <oauth@ietf.org>; Tue, 17 Jul 2018 12:14:48 -0700 (PDT)
Received: by mail-pg1-x52c.google.com with SMTP id p23-v6so844461pgv.13 for <oauth@ietf.org>; Tue, 17 Jul 2018 12:14:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=5pz4bB5pLh8VN7Jeeb51DNtl33MLnJAE7AUw+d3qi7g=; b=U/ou3X8Ia42btXkAcQO8Lfm77wt3maap4FbhGnpURJSp1wUYDwGhbJN2t3VmDME8PQ 2jQ2sYjfyAl0w04kLW/LhwEpuN0jRzsfoaPYeGd/wolmtl14JvoYO9RO8Nau9xd5Lvh1 pzVfocx1zK0LnyaeGDLGjD+uWYYQb24Pc5zJadhqewj26npO21E0rD6TFgpUhrF+o9mR /z8t+a3XMch3LppsSSSQbnSf48HztdBPoROUjXDMYJVS2AELPNjXrG7pZOPVy4Qry0a5 6MjEv1Rzsf/AMelSkDqJKOC3QZrTDgVguqM93wdKfyStLN4uqLgoI2XSsAPHmX0/RFb8 qGlw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=5pz4bB5pLh8VN7Jeeb51DNtl33MLnJAE7AUw+d3qi7g=; b=p5h+CirzEEqAqw2AGKJyEBiuphI6EffD15p6dQEjNoMdf0F8nBA6s98m6SaVOEYqFk ntymOusBZ7IJWGvP7Btl8B29BeqRRAvgWSbca92xzbfvdrsM4oa0aScEP14t2Z86JSMO /wj+RsA3BaQhZntprJnxfKQFrSZdJXo3Cgw+xRF99xEOxSo/JA00vl2fvnMC3kqCXlyT J5CCmoH2vRrxeRJzezhEn/eMqfk3bUo9KqmUoesaaFYN3sR+sdZjb8C8u8v4bHAoZEpU O4pNAAegwlv1L5UxNFkq/4Q95tsyP4EtODfMOHdRrbJx4V8YePYhJv+fcVKNABXHihP3 CzjA==
X-Gm-Message-State: AOUpUlEulDZsAhNczo9nMuoJVMGDCbWeVumAwGChuxw4UJ1E2mBlOEli cyB9x62T8pI4cMaHfFxiry8B5ZAYOZmIfwG2eBQ=
X-Google-Smtp-Source: AAOMgpcpTxIeYAeUPgjohFMyjqsY6ClQGjj1e6XJEhNKKEuYRm02whGHs2nZ6/qHKK0NUM4nwhFgRG18bRoKcVj5iH8=
X-Received: by 2002:a65:62ce:: with SMTP id m14-v6mr2758165pgv.407.1531854888444;  Tue, 17 Jul 2018 12:14:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Tue, 17 Jul 2018 12:14:27 -0700 (PDT)
In-Reply-To: <CAGL6epK1bV_qCSkpCe1pHTpsSxp5_F_2zLqv-AKHNozxTXBvtQ@mail.gmail.com>
References: <152719369843.5001.6781345939306593672@ietfa.amsl.com> <52D0886F-C7B3-4F98-B1CE-70E8406656D5@lodderstedt.net> <CAD9ie-vZ8TcjUUZLzTnanXy_xNFhpRE=a-McPxyPdv=R+JUg3A@mail.gmail.com> <CAGL6epK1bV_qCSkpCe1pHTpsSxp5_F_2zLqv-AKHNozxTXBvtQ@mail.gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 17 Jul 2018 15:14:27 -0400
Message-ID: <CAD9ie-u7sgJV5Wz9NSEUNHBo472k8zyQXMyPKVeCmtPui8znQA@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: Torsten Lodderstedt <torsten@lodderstedt.net>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000792863057136c2f1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/PqZo8tPrG37UtyH2e_wLlKcpZlg>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-reciprocal-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 19:14:52 -0000

--000000000000792863057136c2f1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks for the feedback!

I'll break out my ASCII art skills.

On Tue, Jul 17, 2018 at 2:56 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Hi Dick,
>
> I too reviewed the document, and had similar questions in mind.
> I agree with Torsten, a figure would make it easier to follow and
> understand.
>
> Regards,
>  Rifaat
>
>
> On Tue, Jul 17, 2018 at 12:01 PM Dick Hardt <dick.hardt@gmail.com> wrote:
>
>> Thanks for the review Torsten. All good points to be clarified in the
>> doc. Responses inserted ...
>>
>> On Tue, Jul 17, 2018 at 11:22 AM, Torsten Lodderstedt <
>> torsten@lodderstedt.net> wrote:
>>
>>> Hi Dick,
>>>
>>> I gave you draft a read and came up with the following questions:
>>>
>>> Section 2: How does Party A know it is supposed to conduct a reciprocal
>>> OAuth flow if Party B does not indicate so in the authorization respons=
e?
>>>
>>
>> Out of band configuration. Will clarify in next version.
>>
>>
>>>
>>> Section 3
>>>
>>> Party A is supposed to call the token endpoint of Party B using an
>>> authorization code generated by Party A. How does Party B interpret thi=
s
>>> code? Or does it just send this code back to Party A to obtain its acce=
ss
>>> token for A?
>>>
>>
>> Yes, per last sentence in Section 3. What language would clarify that?
>>
>>
>>>
>>> Party B uses the access token issued to Party A in the first part of th=
e
>>> flow (ordinary OAuth code flow) to identify the respective user account
>>> with Party B. Since the AS consumes its access token as an RS, does Par=
ty A
>>> need to include a certain scope in the code flow request in order to en=
able
>>> this part of the flow?
>>>
>>
>> Party A is using its own access token for context. Party B is not
>> accessing the user context / account.
>>
>>
>>>
>>> How is the AS of Party B supposed to determine the token endpoint of
>>> Party A=E2=80=99s AS?
>>>
>>
>> Same as Party A learns Party B's token endpoint.
>>
>> In practice, the flow could be started by either party. Both can initiat=
e
>> and complete. I'll clarify in the next version.
>>
>>
>>>
>>> I think a figure of the overall process would help to understand the
>>> concept.
>>>
>>
>> It is pretty much the same as OAuth with one extra flow. I can add if
>> that would help.
>>
>>
>>>
>>> kind regards,
>>> Torsten.
>>>
>>> > Am 24.05.2018 um 22:28 schrieb internet-drafts@ietf.org:
>>> >
>>> >
>>> > A New Internet-Draft is available from the on-line Internet-Drafts
>>> directories.
>>> > This draft is a work item of the Web Authorization Protocol WG of the
>>> IETF.
>>> >
>>> >        Title           : Reciprocal OAuth
>>> >        Author          : Dick Hardt
>>> >       Filename        : draft-ietf-oauth-reciprocal-00.txt
>>> >       Pages           : 4
>>> >       Date            : 2018-05-24
>>> >
>>> > Abstract:
>>> >   There are times when a user has a pair of protected resources that
>>> >   would like to request access to each other.  While OAuth flows
>>> >   typically enable the user to grant a client access to a protected
>>> >   resource, granting the inverse access requires an additional flow.
>>> >   Reciprocal OAuth enables a more seamless experience for the user to
>>> >   grant access to a pair of protected resources.
>>> >
>>> >
>>> > The IETF datatracker status page for this draft is:
>>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>>> >
>>> > There are also htmlized versions available at:
>>> > https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00
>>> > https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reciprocal-00
>>> >
>>> >
>>> > Please note that it may take a couple of minutes from the time of
>>> submission
>>> > until the htmlized version and diff are available at tools.ietf.org.
>>> >
>>> > Internet-Drafts are also available by anonymous FTP at:
>>> > ftp://ftp.ietf.org/internet-drafts/
>>> >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>

--000000000000792863057136c2f1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks for the feedback!<div><br></div><div>I&#39;ll break=
 out my ASCII art skills.</div></div><div class=3D"gmail_extra"><br><div cl=
ass=3D"gmail_quote">On Tue, Jul 17, 2018 at 2:56 PM, Rifaat Shekh-Yusef <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blan=
k">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex"><div dir=3D"ltr">Hi Dick,<div><br></div><div>I too reviewed the docum=
ent, and had similar questions in mind.</div><div>I agree with Torsten, a f=
igure would make it easier to follow and understand.</div><div><br></div><d=
iv>Regards,</div><div>=C2=A0Rifaat</div><div><br></div></div><div class=3D"=
HOEnZb"><div class=3D"h5"><br><div class=3D"gmail_quote"><div dir=3D"ltr">O=
n Tue, Jul 17, 2018 at 12:01 PM Dick Hardt &lt;<a href=3D"mailto:dick.hardt=
@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt; wrote:<br></div>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"ltr">Thanks for the review Torst=
en. All good points to be clarified in the doc. Responses inserted ...<div =
class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Jul 17, 2018 a=
t 11:22 AM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:tor=
sten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</sp=
an> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
I gave you draft a read and came up with the following questions:<br>
<br>
Section 2: How does Party A know it is supposed to conduct a reciprocal OAu=
th flow if Party B does not indicate so in the authorization response?<br><=
/blockquote><div><br></div><div>Out of band configuration. Will clarify in =
next version.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3<br>
<br>
Party A is supposed to call the token endpoint of Party B using an authoriz=
ation code generated by Party A. How does Party B interpret this code? Or d=
oes it just send this code back to Party A to obtain its access token for A=
?<br></blockquote><div><br></div><div>Yes, per last sentence in Section 3. =
What language would clarify that?</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<br>
Party B uses the access token issued to Party A in the first part of the fl=
ow (ordinary OAuth code flow) to identify the respective user account with =
Party B. Since the AS consumes its access token as an RS, does Party A need=
 to include a certain scope in the code flow request in order to enable thi=
s part of the flow?<br></blockquote><div><br></div><div>Party A is using it=
s own access token for context. Party B is not accessing the user context /=
 account.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
How is the AS of Party B supposed to determine the token endpoint of Party =
A=E2=80=99s AS?<br></blockquote><div><br></div><div>Same as Party A learns =
Party B&#39;s token endpoint.</div><div><br></div><div>In practice, the flo=
w could be started by either party. Both can initiate and complete. I&#39;l=
l clarify in the next version.</div><div>=C2=A0</div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">
<br>
I think a figure of the overall process would help to understand the concep=
t. <br></blockquote><div><br></div><div>It is pretty much the same as OAuth=
 with one extra flow. I can add if that would help.</div><div>=C2=A0</div><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">
<br>
kind regards,<br>
Torsten. <br>
<div class=3D"m_4751485916676142986m_3921506337688083612HOEnZb"><div class=
=3D"m_4751485916676142986m_3921506337688083612h5"><br>
&gt; Am 24.05.2018 um 22:28 schrieb <a href=3D"mailto:internet-drafts@ietf.=
org" target=3D"_blank">internet-drafts@ietf.org</a>:<br>
&gt; <br>
&gt; <br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Web Authorization Protocol WG of the =
IETF.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: Reciprocal OAuth<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : =
Dick Hardt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-=
ietf-oauth-reciprocal-<wbr>00.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: 4<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 : 2018-05-24<br>
&gt; <br>
&gt; Abstract:<br>
&gt;=C2=A0 =C2=A0There are times when a user has a pair of protected resour=
ces that<br>
&gt;=C2=A0 =C2=A0would like to request access to each other.=C2=A0 While OA=
uth flows<br>
&gt;=C2=A0 =C2=A0typically enable the user to grant a client access to a pr=
otected<br>
&gt;=C2=A0 =C2=A0resource, granting the inverse access requires an addition=
al flow.<br>
&gt;=C2=A0 =C2=A0Reciprocal OAuth enables a more seamless experience for th=
e user to<br>
&gt;=C2=A0 =C2=A0grant access to a pair of protected resources.<br>
&gt; <br>
&gt; <br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-reciproca=
l/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>=
doc/draft-ietf-oauth-<wbr>reciprocal/</a><br>
&gt; <br>
&gt; There are also htmlized versions available at:<br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draf=
t-ietf-oauth-reciprocal-00</a><br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reci=
procal-00" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/<wbr>doc/html/draft-ietf-oauth-<wbr>reciprocal-00</a><br>
&gt; <br>
&gt; <br>
&gt; Please note that it may take a couple of minutes from the time of subm=
ission<br>
&gt; until the htmlized version and diff are available at <a href=3D"http:/=
/tools.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<b=
r>
&gt; <br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" tar=
get=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>=
<br>
<br>
</div></div></blockquote></div><br></div></div>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
</blockquote></div>
</div></div></blockquote></div><br></div>

--000000000000792863057136c2f1--


From nobody Tue Jul 17 13:27:08 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1658130EF2 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 13:27:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mfEigMjz64s4 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 13:27:03 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18144130E62 for <oauth@ietf.org>; Tue, 17 Jul 2018 13:27:02 -0700 (PDT)
Received: from [84.158.233.58] (helo=[192.168.71.123]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1ffWYm-0008I6-3b; Tue, 17 Jul 2018 22:27:00 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <629FEF02-7853-4FA5-8895-0851809C8BA0@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_BDFB3C57-BF63-418B-BF85-0E38982C4E24"; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 17 Jul 2018 22:26:57 +0200
In-Reply-To: <CAAP42hCDH3bGiiyLX47SyKha1PnwhMLws=_25bTYj1pEz6at4g@mail.gmail.com>
Cc: oauth <oauth@ietf.org>
To: William Denniss <wdenniss@google.com>
References: <153021689405.18540.5214482725778765448@ietfa.amsl.com> <F399049B-C36E-4014-8717-B82270A2EBF8@lodderstedt.net> <CAAP42hCDH3bGiiyLX47SyKha1PnwhMLws=_25bTYj1pEz6at4g@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mjJPCAKZK-Z150ldIw44fjl_tqo>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-incremental-authz-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 20:27:07 -0000

--Apple-Mail=_BDFB3C57-BF63-418B-BF85-0E38982C4E24
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi William,=20

I think it would make sense to add AS metadata fields, which the AS can =
use to advertise support for include_granted_scopes and existing_grant.

kind regards,
Torsten.=20

> Am 17.07.2018 um 19:33 schrieb William Denniss <wdenniss@google.com>:
>=20
> Hi Torsten,
>=20
> On Tue, Jul 17, 2018 at 7:57 AM, Torsten Lodderstedt =
<torsten@lodderstedt.net> wrote:
> Hi William,=20
>=20
> please find below my review feedback.
>=20
> First of all, I think you managed to come up with the minimal =
extension needed to address a very relevant use case. Thanks!
>=20
> Glad you like it! Thanks for reviewing.
> =20
> - Section 5, last paragraph.=20
>=20
> "the new refresh token issued in the Access Token Response (Section =
4.1.4 of ) SHOULD include authorization for the scopes in the previous =
grant.=E2=80=9C
>=20
> Wouldn=E2=80=99t it be better to make that a MUST? Otherwise the =
client must assume the AS decides to not include all previously granted =
scopes, which in turn means the client must keep older grants (and hope =
the AS dd not automatically revolve it).
>=20
> I was torn about this. =46rom a protocol perspective you're not =
implementing the protocol if you don't do that, so it should be a MUST. =
However, we need to be careful that we defer to the provider when it =
comes to what authorization is included as this is always their =
discretion.  I'll think of a better way to word this so that it can be a =
MUST while still not limiting the provider's discretion.
> =20
>=20
> - Section 6.1.1
>=20
> The section describes how a client should handle denial for =
incremental authorizations. How is the AS supposed to handle it? =46rom =
the text one could deduce the AS should not discard any pre-existing =
granted scopes. Is that correct? Would it make sense to explicitly state =
that?
>=20
> Good point. That section is mostly talking about the client, I'll add =
a section for the server. I agree, the normal behavior would not be to =
revoke previously granted scopes (which is how Google implements it).
>=20
> Best,
> William
>=20
>=20
> > Am 28.06.2018 um 22:14 schrieb internet-drafts@ietf.org:
> >=20
> >=20
> > A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> > This draft is a work item of the Web Authorization Protocol WG of =
the IETF.
> >=20
> >        Title           : OAuth 2.0 Incremental Authorization
> >        Author          : William Denniss
> >       Filename        : draft-ietf-oauth-incremental-authz-00.txt
> >       Pages           : 8
> >       Date            : 2018-06-28
> >=20
> > Abstract:
> >   OAuth 2.0 authorization requests that include every scope the =
client
> >   might ever need can result in over-scoped authorization and a sub-
> >   optimal end-user consent experience.  This specification enhances =
the
> >   OAuth 2.0 authorization protocol by adding incremental =
authorization,
> >   the ability to request specific authorization scopes as needed, =
when
> >   they're needed, removing the requirement to request every possible
> >   scope that might be needed upfront.
> >=20
> >=20
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-oauth-incremental-authz/
> >=20
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-oauth-incremental-authz-00
> > =
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-incremental-authz-0=
0
> >=20
> >=20
> > Please note that it may take a couple of minutes from the time of =
submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >=20
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >=20
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


--Apple-Mail=_BDFB3C57-BF63-418B-BF85-0E38982C4E24
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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=
--Apple-Mail=_BDFB3C57-BF63-418B-BF85-0E38982C4E24--


From nobody Tue Jul 17 15:42:33 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5944D130E1E; Tue, 17 Jul 2018 15:42:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.82.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: oauth@ietf.org
Message-ID: <153186734430.12667.18074816487124272831@ietfa.amsl.com>
Date: Tue, 17 Jul 2018 15:42:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/QpavsGbng9CrImZoAaKhukDqHP8>
Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-device-flow-11.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 22:42:25 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Web Authorization Protocol WG of the IETF.

        Title           : OAuth 2.0 Device Flow for Browserless and Input Constrained Devices
        Authors         : William Denniss
                          John Bradley
                          Michael B. Jones
                          Hannes Tschofenig
	Filename        : draft-ietf-oauth-device-flow-11.txt
	Pages           : 19
	Date            : 2018-07-17

Abstract:
   This OAuth 2.0 authorization flow for browserless and input
   constrained devices, often referred to as the device flow, enables
   OAuth clients to request user authorization from devices that have an
   Internet connection, but don't have an easy input method (such as a
   smart TV, media console, picture frame, or printer), or lack a
   suitable browser for a more traditional OAuth flow.  This
   authorization flow instructs the user to perform the authorization
   request on a secondary device, such as a smartphone.  There is no
   requirement for communication between the constrained device and the
   user's secondary device.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-oauth-device-flow-11
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-device-flow-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-device-flow-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul 17 15:45:56 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECA1F130DF4 for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 15:45:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N3cgIroCv2Rq for <oauth@ietfa.amsl.com>; Tue, 17 Jul 2018 15:45:52 -0700 (PDT)
Received: from mail-ua0-x243.google.com (mail-ua0-x243.google.com [IPv6:2607:f8b0:400c:c08::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3802F130F1D for <oauth@ietf.org>; Tue, 17 Jul 2018 15:45:52 -0700 (PDT)
Received: by mail-ua0-x243.google.com with SMTP id g18-v6so1729281uam.6 for <oauth@ietf.org>; Tue, 17 Jul 2018 15:45:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=xJuiTb+gLNHPRLyEcqSrBqJ5mAG8TpIOxziuj0k1Zbg=; b=uWEQFBrRSPhp775aoR4s/B2fDsriioSLc+7gxwtggqiezBE9PxfjddQ186xbLGLqQy bepcMbcvL4TPxJJ0xkwoN3Mtu2Pf6BHHMG2q2XZz8xy7D3JdiZ9nZ+3Rgqao7XSif8Yc 8A2OZKO/yNCl1RDBaUqUBM5yBbmU3MS2YxQDw8pVwCpcbSSaQ6SJxi5EhFldaXmRM7sz aWecW5KLnRFWbQGv38nlZypanTiDUVl+Ii4IyVf4N9jr+Imzc+5mjTQRb62mI9vUXVU1 qTRpf5r0Ybfu/do6KJYhtEfJ8HJJasadC1VldEGCs9HSNJ3WTob88gNuQHn9JZxERb5W 7XfQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=xJuiTb+gLNHPRLyEcqSrBqJ5mAG8TpIOxziuj0k1Zbg=; b=SqFiUU4Uq4AWnivgRAnVCnZS+DLGqioz4Fx1v2PU6vHjVgHaRD3WoVGVyvzc7WQv3g 3BB0LNN1s0tx/o5Wik7yc1sqry3GGeaBP8/cDd/KYO/rHd3GzckR53PTpSAF2AbecpN6 4fPYgqCLM2X9AQhTjDcK1FIeN2gLjOMU1CX9vFEG6Fl1jGaU3RavekACJx6faPzjhV7X V9DbQFF7P6JHQNY0sD8ZNd9wSTO5dlb3vBlkWh3LiZTsExVPWZ+9Ga/vnTZKhAlEkMlD bwHLcXpjo/k88wvzpfjKPeTKMNKqjxqBYi20U/oEI2EQ+B+Sq73deUhKBVCis5CT3ToC Wz3Q==
X-Gm-Message-State: AOUpUlERuIERZ9RcNPqN+3Hc/W6beDD1Mof4rXb9bJb5zrs0osbBQ9hh 3kF+Y7NVeMtvCzqQjfpAI/RZ8DnCNVwEgL7eBCf+8ROe+IQ=
X-Google-Smtp-Source: AAOMgpcnSh+A7h1gvwTVp2HkRZa7q/c8nbEc/uKy43pRNfRkoHBCDgdiD8OQ0Or4YJUesL0Za5/ZuejinMzKwYBruSg=
X-Received: by 2002:ab0:2783:: with SMTP id t3-v6mr2358875uap.181.1531867550662;  Tue, 17 Jul 2018 15:45:50 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Tue, 17 Jul 2018 15:45:30 -0700 (PDT)
In-Reply-To: <153186734430.12667.18074816487124272831@ietfa.amsl.com>
References: <153186734430.12667.18074816487124272831@ietfa.amsl.com>
From: William Denniss <wdenniss@google.com>
Date: Tue, 17 Jul 2018 15:45:30 -0700
Message-ID: <CAAP42hDCAHM=JOsXGKDSMDK1jqh9-W8ycWTajuK7KnL5c-NnOw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000033c014057139b5fe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/zJHn4DtHiNn1-Tsj8SY_bgMK_YM>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-device-flow-11.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 22:45:55 -0000

--00000000000033c014057139b5fe
Content-Type: text/plain; charset="UTF-8"

Version 11 updates the reference to the published version of OAuth 2.0
Authorization Server Metadata (RFC 8414).

On Tue, Jul 17, 2018 at 3:42 PM, <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Web Authorization Protocol WG of the IETF.
>
>         Title           : OAuth 2.0 Device Flow for Browserless and Input
> Constrained Devices
>         Authors         : William Denniss
>                           John Bradley
>                           Michael B. Jones
>                           Hannes Tschofenig
>         Filename        : draft-ietf-oauth-device-flow-11.txt
>         Pages           : 19
>         Date            : 2018-07-17
>
> Abstract:
>    This OAuth 2.0 authorization flow for browserless and input
>    constrained devices, often referred to as the device flow, enables
>    OAuth clients to request user authorization from devices that have an
>    Internet connection, but don't have an easy input method (such as a
>    smart TV, media console, picture frame, or printer), or lack a
>    suitable browser for a more traditional OAuth flow.  This
>    authorization flow instructs the user to perform the authorization
>    request on a secondary device, such as a smartphone.  There is no
>    requirement for communication between the constrained device and the
>    user's secondary device.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-oauth-device-flow-11
> https://datatracker.ietf.org/doc/html/draft-ietf-oauth-device-flow-11
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-device-flow-11
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--00000000000033c014057139b5fe
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Version 11 updates the reference to the published version =
of=C2=A0OAuth 2.0 Authorization Server Metadata (<span style=3D"font-size:s=
mall;text-decoration-style:initial;text-decoration-color:initial;float:none=
;display:inline">RFC 8414).</span><br></div><div class=3D"gmail_extra"><br>=
<div class=3D"gmail_quote">On Tue, Jul 17, 2018 at 3:42 PM,  <span dir=3D"l=
tr">&lt;<a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">inter=
net-drafts@ietf.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Web Authorization Protocol WG of the IETF.=
<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 OAuth 2.0 Device Flow for Browserless and Input Constrained Devices<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Will=
iam Denniss<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 John Bradley<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Michael B. Jones<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Hannes Tschofenig<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-oauth-device-flow-<wbr>11.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 19<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2018-07-17<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This OAuth 2.0 authorization flow for browserless and input<br=
>
=C2=A0 =C2=A0constrained devices, often referred to as the device flow, ena=
bles<br>
=C2=A0 =C2=A0OAuth clients to request user authorization from devices that =
have an<br>
=C2=A0 =C2=A0Internet connection, but don&#39;t have an easy input method (=
such as a<br>
=C2=A0 =C2=A0smart TV, media console, picture frame, or printer), or lack a=
<br>
=C2=A0 =C2=A0suitable browser for a more traditional OAuth flow.=C2=A0 This=
<br>
=C2=A0 =C2=A0authorization flow instructs the user to perform the authoriza=
tion<br>
=C2=A0 =C2=A0request on a secondary device, such as a smartphone.=C2=A0 The=
re is no<br>
=C2=A0 =C2=A0requirement for communication between the constrained device a=
nd the<br>
=C2=A0 =C2=A0user&#39;s secondary device.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/" =
rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/=
draft-ietf-oauth-device-<wbr>flow/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-device-flow-11" rel=
=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft-ie=
tf-oauth-device-flow-<wbr>11</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-oauth-device-fl=
ow-11" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<w=
br>doc/html/draft-ietf-oauth-<wbr>device-flow-11</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-oauth-device-flow=
-11" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?<wbr=
>url2=3Ddraft-ietf-oauth-device-<wbr>flow-11</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
<br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
</blockquote></div><br></div>

--00000000000033c014057139b5fe--


From nobody Wed Jul 18 06:32:30 2018
Return-Path: <kaorumaeda.ml@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2217130E9A for <oauth@ietfa.amsl.com>; Wed, 18 Jul 2018 06:32:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CB5giYCOWNdA for <oauth@ietfa.amsl.com>; Wed, 18 Jul 2018 06:32:27 -0700 (PDT)
Received: from mail-qk0-x232.google.com (mail-qk0-x232.google.com [IPv6:2607:f8b0:400d:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15E45130DE5 for <oauth@ietf.org>; Wed, 18 Jul 2018 06:32:27 -0700 (PDT)
Received: by mail-qk0-x232.google.com with SMTP id 126-v6so723727qke.5 for <oauth@ietf.org>; Wed, 18 Jul 2018 06:32:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=gMKESGf1WKBmUETsXzbJq+RUBkXgP+w4WXcQZtTthoE=; b=vDlAgHZ2nAplAAadxjirKuv7YskckP0mj6eJPqJves5sBMNOxcgGS9VlV0hxEz1hVd ApX4fUtMg6dV3Cgowd/RApv2Q/uXkJjpbatsjhaI9IVenMcKK0PiTzy44iatxzVT7Osd BaFcMulyShydUKSjLQLJIn2wOTM0XvFpHU1nrl3vNfzYepznyJImKzFdq0ACIsQM63hv KOCV6oC4F2FeDA/F3A+j0/0y5OOsh4OCXKyTjyuJvChHt7VLysce/5+tEQ3wmohdmjNX DzAqXJaR9hx9TN98m0+96LouszNkhU8waRW0rXvZZXlA0mx/H6ZC3JX8T0WklX5LpiC9 nsrA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=gMKESGf1WKBmUETsXzbJq+RUBkXgP+w4WXcQZtTthoE=; b=ZIm3UqoVY+jf1Qs+n24pNqaTT3jnyc8QVHj9belS///IEUlNyBY4OI6pEuuS1/y18U 31hbsBWwphByYoteIePR3xk+18RWMMd/i/SBoIXfPvJ8bNWP34UTo/Q0PoJ9tOJgPtiV SUeLK5ObSVne4/WG3RZ43E1dXZ6P0Dg5D/LcNEAXO4b4KL+32RpyXnIEXmNymIbX4Y0o mwcZV1FpCWBEYeVzVztjnTonOmadgwA42a67ayK4FTfObsR3fbivMz63pKGICq4Oi0Pw ykoIx1Ppn54Mib5GmDmYBsf8JDJ8Uhlgh2P40f2DZsb0pW5+V6yDlWfqXSCArOzT0Qjv E9jA==
X-Gm-Message-State: AOUpUlFSJ9LGiz9upsCLRWWZw5RGfm+VZalz6GxIPJEj92ELjvGUhodv /cCFadM0Kdw3ygVYnxDFrY/74cnjgRAqE3VVVzkKjw==
X-Google-Smtp-Source: AAOMgpdOIGd9f+E3iJp8y/IHrfzH0ilKWwfcO+FgnO9XfDdBlBHsQ6JTgilXdMdlwQBEYqHaGVQsQwWT3YCJiIwrQcE=
X-Received: by 2002:a37:34cb:: with SMTP id b194-v6mr5399021qka.258.1531920745806;  Wed, 18 Jul 2018 06:32:25 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:4112:0:0:0:0:0 with HTTP; Wed, 18 Jul 2018 06:32:25 -0700 (PDT)
From: Kaoru Maeda <kaorumaeda.ml@gmail.com>
Date: Wed, 18 Jul 2018 09:32:25 -0400
Message-ID: <CAFDeSfdK4JYfjzcGF4KV+bqJx8kxdAvrduwVXW=UhV+U931ZaQ@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000e0bec8057146171d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/GAOWJB_lDV4p3BU2-k9pMNxgsWY>
Subject: [OAUTH-WG] Editorial: draft-ietf-oauth-jwsreq-16
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jul 2018 13:32:29 -0000

--000000000000e0bec8057146171d
Content-Type: text/plain; charset="UTF-8"

Hi,

I have some questions on jwsreq-16 (maybe editorial).

* Section 5.2.1
In the request_uri example, what does fragment part (#Gku...) mean?
https://tfp.example.org/request.jwt#GkurKxf5T0Y-mnPFCHqWOMiZi4VS138cQO_V7PZHAdM
Does this fragment correspond to the entropy mentioned in the text?

* Section 10.4
"redirect_uri" should read "request_uri"

* Section 10.4.x
There are two media types mentioned: application/jose, and /json.
Earlier in the document I found application/jwt.
It seems to make sense even when all of these are application/jwt.
Does application/jose specifically mean JWS/JWE?
Is these difference intentional?

Regards,

Kaoru Maeda

--000000000000e0bec8057146171d
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I have some questions on jwsreq-16 =
(maybe editorial).</div><div><br></div><div>* Section 5.2.1</div><div>In th=
e request_uri example, what does fragment part (#Gku...) mean?</div><div><d=
iv><a href=3D"https://tfp.example.org/request.jwt#GkurKxf5T0Y-mnPFCHqWOMiZi=
4VS138cQO_V7PZHAdM">https://tfp.example.org/request.jwt#GkurKxf5T0Y-mnPFCHq=
WOMiZi4VS138cQO_V7PZHAdM</a></div></div><div>Does this fragment correspond =
to the entropy mentioned in the text?</div><div><br></div><div>* Section 10=
.4</div><div>&quot;redirect_uri&quot; should read &quot;request_uri&quot;</=
div><div><br></div><div>* Section 10.4.x</div><div>There are two media type=
s mentioned: application/jose, and /json.</div><div>Earlier in the document=
 I found application/jwt.</div><div>It seems to make sense even when all of=
 these are application/jwt.</div><div>Does application/jose specifically me=
an JWS/JWE?</div><div>Is these difference intentional?</div><div><br></div>=
<div>Regards,</div><div><br></div><div>Kaoru Maeda=C2=A0</div></div>

--000000000000e0bec8057146171d--


From nobody Thu Jul 19 00:55:02 2018
Return-Path: <david@alkaline-solutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7B3B130E97 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 00:55:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AAMVRPwZJaLQ for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 00:54:57 -0700 (PDT)
Received: from alkaline-solutions.com (lithium5.alkaline-solutions.com [173.255.196.46]) by ietfa.amsl.com (Postfix) with ESMTP id 6505F130E93 for <oauth@ietf.org>; Thu, 19 Jul 2018 00:54:57 -0700 (PDT)
Received: from [IPv6:2601:282:202:b210:cc43:fa13:59a2:45be] (unknown [IPv6:2601:282:202:b210:cc43:fa13:59a2:45be]) by alkaline-solutions.com (Postfix) with ESMTPSA id E020E315EC; Thu, 19 Jul 2018 07:54:55 +0000 (UTC)
From: David Waite <david@alkaline-solutions.com>
Message-Id: <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1795FE5B-7170-4530-993F-5A7E0DF82EFC"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Thu, 19 Jul 2018 01:54:54 -0600
In-Reply-To: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com>
Cc: oauth@ietf.org
To: Dick Hardt <dick.hardt@gmail.com>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/KE_G9Ee1cc8H2lxsUGm5V_cBhA0>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 07:55:01 -0000

--Apple-Mail=_1795FE5B-7170-4530-993F-5A7E0DF82EFC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Four comments.

First: What is the rationale for including the parameters as Link =
headers rather than part of the WWW-Authenticate challenge, e.g.:

WWW-Authenticate: Bearer realm=3D"example_realm",
                             scope=3D"example_scope",
                             error=3D=E2=80=9Cinvalid_token",
    resource_uri=3D"https://api.example.com/resource",
    =
oauth_server_metadata_uris=3D"https://as.example.com/.well-known/oauth-aut=
horization-server =
https://different-as.example.com/.well-known/oauth-authorization-server"


My understanding is that the RFC6750 auth-params are extensible (but not =
currently part of any managed registry.)

One reason to go with this vs Link headers is CORS policy - exposing =
Link headers to a remote client must be done all or nothing as part of =
the CORS policy, and can=E2=80=99t be limited by the kind of link.

Second: (retaining link format) Is there a reason the metadata location =
is specified the way it is? It seems like

<https://as.example.com/.well-known/oauth-authorization-server>; =
rel=3D=E2=80=9Coauth_server_metadata_uri"

should be

<https://as.example.com>; rel=3D=E2=80=9Coauth_issuer"

OAuth defines the location of metadata under the .well-known endpoint as =
a MUST. An extension of OAuth may choose from at least three different =
methods for handling extensions beyond this:
1. Add additional keys to the oauth-authorization-server metadata
2. Add additional resources to .well-known for clients to supporting =
their extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99=
 OAuth as a fallback.
3. Define their own parameter, such as rel=3D=E2=80=9Cspecialauth_issuer=E2=
=80=9D, potentially using a different mechanism for specifying metadata

Given all this, it seems appropriate to only support specifying of =
metadata-supplying issuers, not metadata uris.

Third: I have doubts of the usefulness of resource_uri in parallel to =
both the client requested URI and the Authorization =E2=80=9Crealm=E2=80=9D=
 parameter.

As currently defined, the client would be the one enforcing (or possibly =
ignoring) static policy around resource URIs - that a resource URI is =
arbitrary except in that it must match the host (and scheme/port?) of =
the requested URI. The information on the requested URI by the client is =
not shared between the client and AS for it to do its own policy =
verification. It would seem better to send the client origin to the AS =
for it to do (potential) policy verification, rather than relying on =
clients to implement it for them based on static spec policy.

The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as I would =
expect it to be the URI that was requested by the client. The purpose of =
this parameter is a bit confusing, as it is only defined as =E2=80=9CAn =
OAuth 2.0 Resource Endpoint specified in [RFC6750] section 3.2 - where =
the term doesn=E2=80=99t appear in 6750 and there does not appear to be =
a section 3.2 ;-)

It seems that:
a. If the resource_uri is a direct match for the URI requested for the =
client, it is redundant and should be dropped
    (If the resource URI is *not* a direct match with the URI of the =
resource requested by the client, it might need a better name).
b. If the resource URI is meant to provide a certain arbitrary grouping =
for applying tokens within the origin of the resource server, what is =
its value over the preexisting =E2=80=9C realm=E2=80=9D parameter?
c. If the resource URI is meant to provide a way for an AS to allow =
resources to be independent, identified entities on a single origin - =
I=E2=80=99m unsure how a client would understand it is meant to treat =
these resource URIs as independent entities (e.g. be sure not to send =
bearer tokens minted for resource /entity1 to /entity2, or for that =
matter prevent /entity1 from requesting tokens for /entity2).

Admittedly based on not fully understanding the purpose of this =
parameter, it seems to me there exists a simpler flow which better =
leverages the existing Authentication mechanism of HTTP.=20

A request would fail due to an invalid or missing token for the realm at =
the origin, and and the client would make a request to the issuer =
including the origin of the requested resource as a parameter. Any other =
included parameters specified by the WWW-Authenticate challenge =
understood by the client (such as =E2=80=9Cscope=E2=80=9D) would also be =
applied to this request.

Normal authorization grant flow would then happen (as this is the only =
grant type supported by RFC6750). Once the access token is acquired by =
the client, the client associates that token with the =E2=80=9Crealm=E2=80=
=9D parameter given in the initial challenge by the resource server =
origin. Likewise, the =E2=80=98aud=E2=80=99 of the token as returned by =
a token introspection process would be the origin of the resource =
server.

It seems any more complicated protected resource groupings on a resource =
server would need a client to understand the structure of the resource =
server, and thus fetch some sort of resource server metadata.

Fourth and finally: Is the intention to eventually recommend token =
binding here? Token binding as a requirement across clients, resources, =
and the authorization servers would isolate tokens to only being =
consumed within an origin. This would actually make =
redundant/supplemental the AS additions defined within this spec =
(resource/origin request parameter, =E2=80=98aud=E2=80=99 introspection =
response member)

-DW

> On Jun 12, 2018, at 1:28 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
>=20
> Hey OAuth WG
>=20
> I have worked with Nat and Brian to merge our concepts and those are =
captured in the updated draft.
>=20
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/ =
<https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/>
>=20
> We are hopeful the WG will adopt this draft as a WG document.
>=20
> Any comments and feedback are welcome!
>=20
> /Dick
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail=_1795FE5B-7170-4530-993F-5A7E0DF82EFC
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Four =
comments.<div class=3D""><br class=3D""></div><div class=3D"">First: =
What is the rationale for including the parameters as Link headers =
rather than part of the WWW-Authenticate challenge, e.g.:</div><div =
class=3D""><br class=3D""><div class=3D"">WWW-Authenticate: Bearer =
realm=3D"example_realm",</div><div class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;scope=3D"example_scope",</div><div class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp;error=3D=E2=80=9Cinvalid_token",</div><div =
class=3D"">&nbsp; &nbsp; resource_uri=3D"<a =
href=3D"https://api.example.com/resource" =
class=3D"">https://api.example.com/resource</a>",</div><div =
class=3D"">&nbsp; &nbsp; oauth_server_metadata_uris=3D"<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a> <a =
href=3D"https://different-as.example.com/.well-known/oauth-authorization-s=
erver" =
class=3D"">https://different-as.example.com/.well-known/oauth-authorizatio=
n-server</a>"</div><br class=3D""><br class=3D""></div><div class=3D"">My =
understanding is that the RFC6750 auth-params are extensible (but not =
currently part of any managed registry.)</div><div class=3D""><div =
class=3D""><br class=3D""></div><div class=3D"">One reason to go with =
this vs Link headers is CORS policy - exposing Link headers to a remote =
client must be done all or nothing as part of the CORS policy, and =
can=E2=80=99t be limited by the kind of link.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Second: (retaining link format) Is =
there a reason the metadata location is specified the way it is? It =
seems like</div><div class=3D""><br class=3D""></div><div =
class=3D"">&lt;<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a>&gt;; rel=3D=E2=80=9Coauth_server_metadata_uri"</div><div class=3D""><br=
 class=3D""></div><div class=3D"">should be</div><div class=3D""><br =
class=3D""></div><div class=3D""><div class=3D"">&lt;<a =
href=3D"https://as.example.com" class=3D"">https://as.example.com</a>&gt;;=
 rel=3D=E2=80=9Coauth_issuer"</div></div><div class=3D""><br =
class=3D""></div><div class=3D"">OAuth defines the location of metadata =
under the .well-known endpoint as a MUST. An extension of OAuth may =
choose from at least three different methods for handling extensions =
beyond this:</div><div class=3D"">1. Add additional keys to the =
oauth-authorization-server metadata</div><div class=3D"">2. Add =
additional resources to .well-known for clients to supporting their =
extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99 =
OAuth as a fallback.</div><div class=3D"">3. Define their own parameter, =
such as rel=3D=E2=80=9Cspecialauth_issuer=E2=80=9D, potentially using a =
different mechanism for specifying metadata</div><div class=3D""><br =
class=3D""></div><div class=3D"">Given all this, it seems appropriate to =
only support specifying of metadata-supplying issuers, not metadata =
uris.</div><div class=3D""><br class=3D""></div><div class=3D"">Third: I =
have doubts of the usefulness of resource_uri in parallel to both the =
client requested URI and the Authorization =E2=80=9Crealm=E2=80=9D =
parameter.</div></div><div class=3D""><br class=3D""></div><div =
class=3D"">As currently defined, the client would be the one enforcing =
(or possibly ignoring) static policy around resource URIs - that a =
resource URI is arbitrary except in that it must match the host (and =
scheme/port?) of the requested URI. The information on the requested URI =
by the client is not shared between the client and AS for it to do its =
own policy verification. It would seem better to send the client origin =
to the AS for it to do (potential) policy verification, rather than =
relying on clients to implement it for them based on static spec =
policy.</div><div class=3D""><br class=3D""></div><div class=3D"">The =
name =E2=80=9Cresource URI=E2=80=9D is also confusing, as I would expect =
it to be the URI that was requested by the client. The purpose of this =
parameter is a bit confusing, as it is only defined as =E2=80=9CAn OAuth =
2.0 Resource Endpoint specified in [RFC6750] section 3.2 - where the =
term doesn=E2=80=99t appear in 6750 and there does not appear to be a =
section 3.2 ;-)</div><div class=3D""><br class=3D""></div><div =
class=3D"">It seems that:</div><div class=3D"">a. If the resource_uri is =
a direct match for the URI requested for the client, it is redundant and =
should be dropped</div><div class=3D"">&nbsp; &nbsp; (If the resource =
URI is *not* a direct match with the URI of the resource requested by =
the client, it might need a better name).</div><div class=3D"">b. If the =
resource URI is meant to provide a certain arbitrary grouping for =
applying tokens within the origin of the resource server, what is its =
value over the preexisting =E2=80=9C&nbsp;realm=E2=80=9D =
parameter?</div><div class=3D"">c. If the resource URI is meant to =
provide a way for an AS to allow resources to be independent, identified =
entities on a single origin - I=E2=80=99m unsure how a client would =
understand it is meant to treat these resource URIs as independent =
entities (e.g. be sure not to send bearer tokens minted for resource =
/entity1 to /entity2, or for that matter prevent /entity1 from =
requesting tokens for /entity2).</div><div class=3D""><div><br =
class=3D""></div><div>Admittedly based on not fully understanding the =
purpose of this parameter, it seems to me there exists a simpler flow =
which better leverages the existing Authentication mechanism of =
HTTP.&nbsp;</div><div><br class=3D""></div><div>A request would fail due =
to an invalid or missing token for the realm at the origin, and and the =
client would make a request to the issuer including the origin of the =
requested resource as a parameter. Any other included parameters =
specified by the WWW-Authenticate challenge understood by the =
client&nbsp;(such as =E2=80=9Cscope=E2=80=9D) would also be applied to =
this request.</div><div><br class=3D""></div><div>Normal authorization =
grant flow would then happen (as this is the only grant type supported =
by RFC6750). Once the access token is acquired by the client, the client =
associates that token with the =E2=80=9Crealm=E2=80=9D parameter given =
in the initial challenge by the resource server origin. Likewise, the =
=E2=80=98aud=E2=80=99 of the token as returned by a token introspection =
process would be the origin of the resource server.</div><div><br =
class=3D""></div><div>It seems any more complicated protected resource =
groupings on a resource server would need a client to understand the =
structure of the resource server, and thus fetch some sort of resource =
server metadata.</div><div><br class=3D""></div><div>Fourth and finally: =
Is the intention to eventually recommend token binding here? Token =
binding as a requirement across clients, resources, and the =
authorization servers would isolate tokens to only being consumed within =
an origin. This would actually make redundant/supplemental the AS =
additions defined within this spec (resource/origin request parameter, =
=E2=80=98aud=E2=80=99 introspection response member)</div><div><br =
class=3D""></div><div>-DW</div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Jun 12, 2018, at 1:28 PM, =
Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail.com" =
class=3D"">dick.hardt@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D"">Hey OAuth WG<div class=3D""><br class=3D""></div><div =
class=3D"">I have worked with Nat and Brian to merge our concepts and =
those are captured in the updated draft.</div><div class=3D""><br =
class=3D""></div><div class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" =
class=3D"">https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/=
</a><br class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">We are hopeful the WG will adopt this draft as a WG =
document.</div><div class=3D""><br class=3D""></div><div class=3D"">Any =
comments and feedback are welcome!</div><div class=3D""><br =
class=3D""></div><div class=3D"">/Dick</div></div>
_______________________________________________<br class=3D"">OAuth =
mailing list<br class=3D""><a href=3D"mailto:OAuth@ietf.org" =
class=3D"">OAuth@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/oauth<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_1795FE5B-7170-4530-993F-5A7E0DF82EFC--


From nobody Thu Jul 19 05:52:00 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D09B6130E59 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 05:51:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atH1S3SKb63t for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 05:51:46 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC5F8129619 for <oauth@ietf.org>; Thu, 19 Jul 2018 05:51:46 -0700 (PDT)
Received: from [91.14.23.243] (helo=[192.168.179.103]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fg8PH-0000dp-IG; Thu, 19 Jul 2018 14:51:43 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-8096C819-9693-4A75-AC82-B2D8C27BB346; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPad Mail (15F79)
In-Reply-To: <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com>
Date: Thu, 19 Jul 2018 14:51:41 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/lTbcJB1FIvh1WnkwFQmTWWJXeNg>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 12:51:56 -0000

--Apple-Mail-8096C819-9693-4A75-AC82-B2D8C27BB346
Content-Type: multipart/alternative;
	boundary=Apple-Mail-588E3AA2-EB37-4FF8-A416-73E2DF324D49
Content-Transfer-Encoding: 7bit


--Apple-Mail-588E3AA2-EB37-4FF8-A416-73E2DF324D49
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Dick,

> =20
>>=20
>> Section 3:=20
>> Don=E2=80=99t you think it could be a useful information to have the reso=
urce URI available in the authorization flow?I would assume it could have so=
me additional meaning to the AS and could also be the context of the scope.
>=20
> I'm assuming you are referring to the Authorization Code Grant. Good call o=
ut that the resource URI would be useful in the redirect.=20
>=20
> The use cases that I have been working with have all been Client Credentia=
l Grants
>=20
> I currently don't know of a real world use case for the Authorization Code=
 Grant for Distributed OAuth.

I think any scenario with multiple resource servers relying on the same AS f=
or authorization where the client acts on behalf of the resource owner quali=
fies for grant type code and distributed OAuth.=20

Let=E2=80=99s assume a user wants to authorize a client for access to her cl=
oud storage, email account and contacts when setting app the respective app.=


One would use the code grant type for that use case. And having the resource=
 URLs in the authorization flow would allow the AS to further determine the c=
ontext of the requested authorization.

Even more important, the AS could restrict the access tokens for use at this=
 URIs only. At best, the AS would allow the client to obtain different acces=
s tokens for any of the involved resource servers, each of them tailored to t=
he needs of the particular RS (content) and bound to it (aud, token binding,=
 ...).

In the YES context, we have several different services/resources, which can b=
e combined in a single authorization transaction, e.g. initiation of a payme=
nt and creating an electronic signature.

In all solutions I have seen or designed in the past, the resource server wa=
s either carried in the scope parameter or implicitly determined from the sc=
ope values (see OIDC). Making it explicit would result in an interoperable a=
pproach to represent this information and use it to tighten up OAuth securit=
y and privacy (token binding, audience restriction).

kind regards,
Torsten.

> =20
>>=20
>> Section 4:=20
>> I think the client MUST authenticate using a PoP (asymmetric crypto based=
) mechanisms due to the attack angle given in 6.3
>> Did you intentionally restricted the draft to single resources?
>=20
> yes
> =20
>> I would desire support for an integrated UI flow for authorizing access t=
o multiple resources at once. This makes sense in multi-service deployments.=

>=20
> It could be. Would be great to get some real use cases for that in an Auth=
orization Code Grant.
> =20
>>=20
>> Section 6.1.=20
>> I suggest you also refer to https://tools.ietf.org/html/draft-ietf-oauth-=
security-topics-06#section-3.7 for a comprehensive discussion of this threat=
.
>=20
> Thanks
> =20
>>=20
>> kind regards,
>> Torsten.  =20
>>=20
>>=20
>> > Am 12.06.2018 um 21:28 schrieb Dick Hardt <dick.hardt@gmail.com>:
>> >=20
>> > Hey OAuth WG
>> >=20
>> > I have worked with Nat and Brian to merge our concepts and those are ca=
ptured in the updated draft.
>> >=20
>> > https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>> >=20
>> > We are hopeful the WG will adopt this draft as a WG document.
>> >=20
>> > Any comments and feedback are welcome!
>> >=20
>> > /Dick
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20

--Apple-Mail-588E3AA2-EB37-4FF8-A416-73E2DF324D49
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>Hi Dick,</div><div><br></di=
v><blockquote type=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_extra"=
><div class=3D"gmail_quote"><div>&nbsp;</div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3: <br>
Don=E2=80=99t you think it could be a useful information to have the resourc=
e URI available in the authorization flow?I would assume it could have some a=
dditional meaning to the AS and could also be the context of the scope.<br><=
/blockquote><div><br></div><div>I'm assuming you are referring to the Author=
ization Code Grant. Good call out that the resource URI would be useful in t=
he redirect.&nbsp;</div><div><br></div><div>The use cases that I have been w=
orking with have all been Client Credential Grants</div><div><br></div><div>=
I currently don't know of a real world use case for the Authorization Code G=
rant for Distributed OAuth.</div></div></div></div></div></blockquote><div><=
br></div>I think any scenario with multiple resource servers relying on the s=
ame AS for authorization where the client acts on behalf of the resource own=
er qualifies for grant type code and distributed OAuth.&nbsp;<div><br></div>=
<div>Let=E2=80=99s assume a user wants to authorize a client for access to h=
er cloud storage, email account and contacts when setting app the respective=
 app.<div><br></div><div>One would use the code grant type for that use case=
. And having the resource URLs in the authorization flow would allow the AS t=
o further determine the context of the requested authorization.</div><div><b=
r></div><div>Even more important, the AS could restrict the access tokens fo=
r use at this URIs only. At best, the AS would allow the client to obtain di=
fferent access tokens for any of the involved resource servers, each of them=
 tailored to the needs of the particular RS (content) and bound to it (aud, t=
oken binding, ...).</div><div><br></div><div>In the YES context, we have sev=
eral different services/resources, which can be combined in a single authori=
zation transaction, e.g. initiation of a payment and creating an electronic s=
ignature.</div><div><br></div><div>In all solutions I have seen or designed i=
n the past, the resource server was either carried in the scope parameter or=
 implicitly determined from the scope values (see OIDC). Making it explicit w=
ould result in an interoperable approach to represent this information and u=
se it to tighten up OAuth security and privacy (token binding, audience rest=
riction).</div><div><br></div><div>kind regards,</div><div>Torsten.</div><di=
v><br></div><div><div><blockquote type=3D"cite"><div><div dir=3D"ltr"><div c=
lass=3D"gmail_extra"><div class=3D"gmail_quote"><div>&nbsp;</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid=
;padding-left:1ex">
<br>
Section 4: <br>
I think the client MUST authenticate using a PoP (asymmetric crypto based) m=
echanisms due to the attack angle given in 6.3<br>
Did you intentionally restricted the draft to single resources? </blockquote=
><div><br></div><div>yes</div><div>&nbsp;</div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
>I would desire support for an integrated UI flow for authorizing access to m=
ultiple resources at once. This makes sense in multi-service deployments.<br=
></blockquote><div><br></div><div>It could be. Would be great to get some re=
al use cases for that in an Authorization Code Grant.</div><div>&nbsp;</div>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">
<br>
Section 6.1. <br>
I suggest you also refer to <a href=3D"https://tools.ietf.org/html/draft-iet=
f-oauth-security-topics-06#section-3.7" rel=3D"noreferrer" target=3D"_blank"=
>https://tools.ietf.org/html/<wbr>draft-ietf-oauth-security-<wbr>topics-06#s=
ection-3.7</a> for a comprehensive discussion of this threat.<br></blockquot=
e><div><br></div><div>Thanks</div><div>&nbsp;</div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex">
<br>
kind regards,<br>
Torsten.&nbsp; &nbsp;<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
&gt; Am 12.06.2018 um 21:28 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Hey OAuth WG<br>
&gt; <br>
&gt; I have worked with Nat and Brian to merge our concepts and those are ca=
ptured in the updated draft.<br>
&gt; <br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distribut=
ed/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>=
doc/draft-hardt-oauth-<wbr>distributed/</a><br>
&gt; <br>
&gt; We are hopeful the WG will adopt this draft as a WG document.<br>
&gt; <br>
&gt; Any comments and feedback are welcome!<br>
&gt; <br>
&gt; /Dick<br>
</div></div><div class=3D"HOEnZb"><div class=3D"h5">&gt; ___________________=
___________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferr=
er" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><b=
r>
<br>
</div></div></blockquote></div><br></div></div>
</div></blockquote></div></div></div></body></html>=

--Apple-Mail-588E3AA2-EB37-4FF8-A416-73E2DF324D49--

--Apple-Mail-8096C819-9693-4A75-AC82-B2D8C27BB346
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIFPjCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYxggO6MIIDtgIBATCBrTCBlzELMAkGA1UEBhMCR0Ix
GzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR
Q09NT0RPIENBIExpbWl0ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0
aW9uIGFuZCBTZWN1cmUgRW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHh
MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcxOTEyNTE0MVow
IwYJKoZIhvcNAQkEMRYEFLrpX0ZLoKO0LxiyoLeBIQgu9yQcMIG+BgkrBgEEAYI3EAQxgbAwga0w
gZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh
bGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMT0wOwYDVQQDEzRDT01PRE8gUlNBIENs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBAhEAkibUdwuYLa5iFmqSehID
lTCBwAYLKoZIhvcNAQkQAgsxgbCgga0wgZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVy
IE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVk
MT0wOwYDVQQDEzRDT01PRE8gUlNBIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVt
YWlsIENBAhEAkibUdwuYLa5iFmqSehIDlTANBgkqhkiG9w0BAQEFAASCAQC0vJmusgkMxs0Y26TD
AaPLUEOEiEHdPhdYtmldoapEkkx4tMvOi71HQTGaO1gvpEg/kiaDyv0tE/Rv0YOhUSp7doTaxM+L
ZTMKbOxGOROVYXPIFK99XWkcH0POXytAFrOy6oCtmdHuKWzzZlSgWoWlbolG/ESUtaWpuYH7AMGj
oFRKJJGxyh4mS4j2ayRVF4pXXmNGD2on+Pzy9HhNTjlGKk7fgubATh/jkqX3kQjDPUUualn+1/OT
6Sw7wNc05o8DMC6TI5FwCECt2tlkfPEdAFtDFlTFZAAX6r/KELkThtvH2YYRv1zW7Z0cCNGOGECt
fiuhW2wDMbqrL1huysxTAAAAAAAA
--Apple-Mail-8096C819-9693-4A75-AC82-B2D8C27BB346--


From nobody Thu Jul 19 06:42:39 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EDE0130E29 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 06:42:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ksTtyqyqQN4v for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 06:42:34 -0700 (PDT)
Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE801130E0D for <oauth@ietf.org>; Thu, 19 Jul 2018 06:42:34 -0700 (PDT)
Received: by mail-pg1-x52d.google.com with SMTP id n7-v6so3809589pgq.4 for <oauth@ietf.org>; Thu, 19 Jul 2018 06:42:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=hxM4cMXhK9flqvJA9J4U3+kdwDL47jQkJ3K2j36CNQY=; b=aJyzkVxWqFh45P8wMfE2C3Yxj3tHpTh7LbI94Wk/HG+Um4hYVO8ICpVLmhrFU5AT0K cBvmZpngUqre8PDizwiz1H2KBvQ8+R4qxcttMmYiBMwrcaCoDtmOW9QFbSWgB7QsFRxe ezXTBb3VIWALxeeDdgtstYMwEzKGGICJjTz4vqDFP96m1wCAxrJCy1TAVVwdwHl+XjGj y9JhiITydHRPQLw/kbGKKw/zhW+SZaBc9aMf4heWblLbir4sFoafiMnckg8mrWAJ7MVS hQMbhgqLoVPLm1vkuWPefg21sdJnIVWFLmoGmnzrNOvKRafY/lzjK0Z99geHvHCTZgNN 6zIA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=hxM4cMXhK9flqvJA9J4U3+kdwDL47jQkJ3K2j36CNQY=; b=iI21aszTiYtwk6ODU6C04VOw++3MrfVeb/x85RWCFFLoxXNqB8jqtjXLtA/ZmI52ap ISsGWLzMCo86rbJTsChlQuTbJYEUgI1epm3nBM4UFyIx3XCVHTmYp/2bHjQTg3RvVUN0 vKt8iWcRrNIxKHKTkuJZqJ5uJF9IAMhtUc9gAt1ur+HusPpksFTt04Yx8scswoq1aJOu pUng+V7IJM2hAflgQWpLZ5V7dsOHAJoDmmJ3vZtWfQVf3lkaNk/G/LhVCBP8BqUAWR7B oMESlX1hPU30l3aJwpN41iRLJ9ree297VYYM7QFnBPj926dJV8CrmTA89hUwZHkrTBzP 7Ixg==
X-Gm-Message-State: AOUpUlG8lvQh1epB8iOttJzcNZ4GL6rlrXhvg2OI/ips2xjQRNr8A1ih TtJQRMtOp+POq1fTpdZamhAtR1/93SSmpvTm1o2iAa4Y
X-Google-Smtp-Source: AAOMgpf1mBZPhHsg39h7pHFeX6qkOhQ27mFPqmlW+pzj3mFR+YC4ESiC+ezGhAKgNBC2LUV6tDOiyy3tLDYMh/VOL3s=
X-Received: by 2002:a62:be03:: with SMTP id l3-v6mr9572250pff.138.1532007754185;  Thu, 19 Jul 2018 06:42:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Thu, 19 Jul 2018 06:42:13 -0700 (PDT)
In-Reply-To: <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 19 Jul 2018 09:42:13 -0400
Message-ID: <CAD9ie-u-kB+uZW+vVLXTPF8eABrwNhm_BqEnL4wN9SzHV-9cCw@mail.gmail.com>
To: David Waite <david@alkaline-solutions.com>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000fb41d205715a599a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/WYOLeBzfDzedOGttbpgBQJ5mcsg>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 13:42:38 -0000

--000000000000fb41d205715a599a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

David, thanks for the detailed feedback ... responses inline ...

On Thu, Jul 19, 2018 at 3:54 AM, David Waite <david@alkaline-solutions.com>
wrote:

> Four comments.
>
> First: What is the rationale for including the parameters as Link headers
> rather than part of the WWW-Authenticate challenge, e.g.:
>
> WWW-Authenticate: Bearer realm=3D"example_realm",
>                              scope=3D"example_scope",
>                              error=3D=E2=80=9Cinvalid_token",
>     resource_uri=3D"https://api.example.com/resource",
>     oauth_server_metadata_uris=3D"https://as.example.com/.well-
> known/oauth-authorization-server https://different-as.example.
> com/.well-known/oauth-authorization-server"
>
>
> My understanding is that the RFC6750 auth-params are extensible (but not
> currently part of any managed registry.)
>
> One reason to go with this vs Link headers is CORS policy - exposing Link
> headers to a remote client must be done all or nothing as part of the COR=
S
> policy, and can=E2=80=99t be limited by the kind of link.
>
>
Nat had a good argument for using Link headers, I'll let him respond.


> Second: (retaining link format) Is there a reason the metadata location i=
s
> specified the way it is? It seems like
>
> <https://as.example.com/.well-known/oauth-authorization-server>;
> rel=3D=E2=80=9Coauth_server_metadata_uri"
>
> should be
>
> <https://as.example.com>; rel=3D=E2=80=9Coauth_issuer"
>
> OAuth defines the location of metadata under the .well-known endpoint as =
a
> MUST. An extension of OAuth may choose from at least three different
> methods for handling extensions beyond this:
> 1. Add additional keys to the oauth-authorization-server metadata
> 2. Add additional resources to .well-known for clients to supporting thei=
r
> extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99 OAut=
h as a fallback.
> 3. Define their own parameter, such as rel=3D=E2=80=9Cspecialauth_issuer=
=E2=80=9D,
> potentially using a different mechanism for specifying metadata
>
> Given all this, it seems appropriate to only support specifying of
> metadata-supplying issuers, not metadata uris.
>

Interesting, what do others think of this?

There is a security advantage of using a predefined path as a malicious RS
can not have the client fetch a different meta data document than the one
that is at the well known location.


>
> Third: I have doubts of the usefulness of resource_uri in parallel to bot=
h
> the client requested URI and the Authorization =E2=80=9Crealm=E2=80=9D pa=
rameter.
>
> As currently defined, the client would be the one enforcing (or possibly
> ignoring) static policy around resource URIs - that a resource URI is
> arbitrary except in that it must match the host (and scheme/port?) of the
> requested URI. The information on the requested URI by the client is not
> shared between the client and AS for it to do its own policy verification=
.
> It would seem better to send the client origin to the AS for it to do
> (potential) policy verification, rather than relying on clients to
> implement it for them based on static spec policy.
>
> The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as I would exp=
ect it to be the
> URI that was requested by the client. The purpose of this parameter is a
> bit confusing, as it is only defined as =E2=80=9CAn OAuth 2.0 Resource En=
dpoint
> specified in [RFC6750] section 3.2 - where the term doesn=E2=80=99t appea=
r in 6750
> and there does not appear to be a section 3.2 ;-)
>
> It seems that:
> a. If the resource_uri is a direct match for the URI requested for the
> client, it is redundant and should be dropped
>     (If the resource URI is *not* a direct match with the URI of the
> resource requested by the client, it might need a better name).
>

It is not a direct match. Open to new name suggestions!


> b. If the resource URI is meant to provide a certain arbitrary grouping
> for applying tokens within the origin of the resource server, what is its
> value over the preexisting =E2=80=9C realm=E2=80=9D parameter?
>

It is not arbitrary. The resource URI MUST be contained in the URI the
client is requesting access to. The hostname in the resource URI must be in
the hostname in the TLS certificate. This lets the client ensure it is
requesting an access token that is intended for the resource it is
accessing.

The realm parameter does not have these characteristics specified, and may
already be used for other purposes.


> c. If the resource URI is meant to provide a way for an AS to allow
> resources to be independent, identified entities on a single origin - I=
=E2=80=99m
> unsure how a client would understand it is meant to treat these resource
> URIs as independent entities (e.g. be sure not to send bearer tokens mint=
ed
> for resource /entity1 to /entity2, or for that matter prevent /entity1 fr=
om
> requesting tokens for /entity2).
>

It is intended for the client to enforce.


>
> Admittedly based on not fully understanding the purpose of this parameter=
,
> it seems to me there exists a simpler flow which better leverages the
> existing Authentication mechanism of HTTP.
>
> A request would fail due to an invalid or missing token for the realm at
> the origin, and and the client would make a request to the issuer includi=
ng
> the origin of the requested resource as a parameter. Any other included
> parameters specified by the WWW-Authenticate challenge understood by the
> client (such as =E2=80=9Cscope=E2=80=9D) would also be applied to this re=
quest.
>
> Normal authorization grant flow would then happen (as this is the only
> grant type supported by RFC6750). Once the access token is acquired by th=
e
> client, the client associates that token with the =E2=80=9Crealm=E2=80=9D=
 parameter given
> in the initial challenge by the resource server origin. Likewise, the =E2=
=80=98aud=E2=80=99
> of the token as returned by a token introspection process would be the
> origin of the resource server.
>
> It seems any more complicated protected resource groupings on a resource
> server would need a client to understand the structure of the resource
> server, and thus fetch some sort of resource server metadata.
>

I'm not understanding why you think this. Would you elaborate?


>
> Fourth and finally: Is the intention to eventually recommend token bindin=
g
> here? Token binding as a requirement across clients, resources, and the
> authorization servers would isolate tokens to only being consumed within =
an
> origin. This would actually make redundant/supplemental the AS additions
> defined within this spec (resource/origin request parameter, =E2=80=98aud=
=E2=80=99
> introspection response member)
>

Token binding solves part of the resource constrained access token
requirement, but does not solve how the client authenticates to the AS.



>
> -DW
>
> On Jun 12, 2018, at 1:28 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
>
> Hey OAuth WG
>
> I have worked with Nat and Brian to merge our concepts and those are
> captured in the updated draft.
>
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
> We are hopeful the WG will adopt this draft as a WG document.
>
> Any comments and feedback are welcome!
>
> /Dick
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>

--000000000000fb41d205715a599a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">David, thanks for the detailed feedback ... responses inli=
ne ...=C2=A0<div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Th=
u, Jul 19, 2018 at 3:54 AM, David Waite <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:david@alkaline-solutions.com" target=3D"_blank">david@alkaline-solutio=
ns.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=
=3D"word-wrap:break-word;line-break:after-white-space">Four comments.<div><=
br></div><div>First: What is the rationale for including the parameters as =
Link headers rather than part of the WWW-Authenticate challenge, e.g.:</div=
><div><br><div>WWW-Authenticate: Bearer realm=3D&quot;example_realm&quot;,<=
/div><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0scope=3D&quot;example_scope&quot;,=
</div><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0error=3D=E2=80=9Cinvalid_token&quo=
t;,</div><div>=C2=A0 =C2=A0 resource_uri=3D&quot;<a href=3D"https://api.exa=
mple.com/resource" target=3D"_blank">https://api.<wbr>example.com/resource<=
/a>&quot;,</div><div>=C2=A0 =C2=A0 oauth_server_metadata_uris=3D&quot;<a hr=
ef=3D"https://as.example.com/.well-known/oauth-authorization-server" target=
=3D"_blank">ht<wbr>tps://as.example.com/.well-<wbr>known/oauth-authorizatio=
n-<wbr>server</a> <a href=3D"https://different-as.example.com/.well-known/o=
auth-authorization-server" target=3D"_blank">https://different-as.example.<=
wbr>com/.well-known/oauth-<wbr>authorization-server</a>&quot;</div><br><br>=
</div><div>My understanding is that the RFC6750 auth-params are extensible =
(but not currently part of any managed registry.)</div><div><div><br></div>=
<div>One reason to go with this vs Link headers is CORS policy - exposing L=
ink headers to a remote client must be done all or nothing as part of the C=
ORS policy, and can=E2=80=99t be limited by the kind of link.</div><div><br=
></div></div></div></blockquote><div><br></div><div>Nat had a good argument=
 for using Link headers, I&#39;ll let him respond.</div><div>=C2=A0</div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px =
#ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word;line-break:=
after-white-space"><div><div></div><div>Second: (retaining link format) Is =
there a reason the metadata location is specified the way it is? It seems l=
ike</div><div><br></div><div>&lt;<a href=3D"https://as.example.com/.well-kn=
own/oauth-authorization-server" target=3D"_blank">https://as.example.com/.w=
ell-<wbr>known/oauth-authorization-<wbr>server</a>&gt;; rel=3D=E2=80=9Coaut=
h_server_metadata_<wbr>uri&quot;</div><div><br></div><div>should be</div><d=
iv><br></div><div><div>&lt;<a href=3D"https://as.example.com" target=3D"_bl=
ank">https://as.example.com</a>&gt;; rel=3D=E2=80=9Coauth_issuer&quot;</div=
></div><div><br></div><div>OAuth defines the location of metadata under the=
 .well-known endpoint as a MUST. An extension of OAuth may choose from at l=
east three different methods for handling extensions beyond this:</div><div=
>1. Add additional keys to the oauth-authorization-server metadata</div><di=
v>2. Add additional resources to .well-known for clients to supporting thei=
r extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99 OAut=
h as a fallback.</div><div>3. Define their own parameter, such as rel=3D=E2=
=80=9Cspecialauth_issuer=E2=80=9D, potentially using a different mechanism =
for specifying metadata</div><div><br></div><div>Given all this, it seems a=
ppropriate to only support specifying of metadata-supplying issuers, not me=
tadata uris.</div></div></div></blockquote><div><br></div><div>Interesting,=
 what do others think of this?</div><div><br></div><div>There is a security=
 advantage of using a predefined path as a malicious RS can not have the cl=
ient fetch a different meta data document than the one that is at the well =
known location.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div s=
tyle=3D"word-wrap:break-word;line-break:after-white-space"><div><div><br></=
div><div>Third: I have doubts of the usefulness of resource_uri in parallel=
 to both the client requested URI and the Authorization =E2=80=9Crealm=E2=
=80=9D parameter.</div></div><div><br></div><div>As currently defined, the =
client would be the one enforcing (or possibly ignoring) static policy arou=
nd resource URIs - that a resource URI is arbitrary except in that it must =
match the host (and scheme/port?) of the requested URI. The information on =
the requested URI by the client is not shared between the client and AS for=
 it to do its own policy verification. It would seem better to send the cli=
ent origin to the AS for it to do (potential) policy verification, rather t=
han relying on clients to implement it for them based on static spec policy=
.</div><div><br></div><div>The name =E2=80=9Cresource URI=E2=80=9D is also =
confusing, as I would expect it to be the URI that was requested by the cli=
ent. The purpose of this parameter is a bit confusing, as it is only define=
d as =E2=80=9CAn OAuth 2.0 Resource Endpoint specified in [RFC6750] section=
 3.2 - where the term doesn=E2=80=99t appear in 6750 and there does not app=
ear to be a section 3.2 ;-)</div><div><br></div><div>It seems that:</div><d=
iv>a. If the resource_uri is a direct match for the URI requested for the c=
lient, it is redundant and should be dropped</div><div>=C2=A0 =C2=A0 (If th=
e resource URI is *not* a direct match with the URI of the resource request=
ed by the client, it might need a better name).</div></div></blockquote><di=
v><br></div><div>It is not a direct match. Open to new name suggestions!</d=
iv><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:=
break-word;line-break:after-white-space"><div>b. If the resource URI is mea=
nt to provide a certain arbitrary grouping for applying tokens within the o=
rigin of the resource server, what is its value over the preexisting =E2=80=
=9C=C2=A0realm=E2=80=9D parameter?</div></div></blockquote><div><br></div><=
div>It is not arbitrary. The resource URI MUST be contained in the URI the =
client is requesting access to. The hostname in the resource URI must be in=
 the hostname in the TLS certificate. This lets the client ensure it is req=
uesting an access token that is intended for the resource it is accessing.<=
/div><div><br></div><div>The realm parameter does not have these characteri=
stics specified, and may already be used for other purposes.</div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word;=
line-break:after-white-space"><div>c. If the resource URI is meant to provi=
de a way for an AS to allow resources to be independent, identified entitie=
s on a single origin - I=E2=80=99m unsure how a client would understand it =
is meant to treat these resource URIs as independent entities (e.g. be sure=
 not to send bearer tokens minted for resource /entity1 to /entity2, or for=
 that matter prevent /entity1 from requesting tokens for /entity2).</div></=
div></blockquote><div><br></div><div>It is intended for the client to enfor=
ce.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style=3D"word=
-wrap:break-word;line-break:after-white-space"><div><div><br></div><div>Adm=
ittedly based on not fully understanding the purpose of this parameter, it =
seems to me there exists a simpler flow which better leverages the existing=
 Authentication mechanism of HTTP.=C2=A0</div><div><br></div><div>A request=
 would fail due to an invalid or missing token for the realm at the origin,=
 and and the client would make a request to the issuer including the origin=
 of the requested resource as a parameter. Any other included parameters sp=
ecified by the WWW-Authenticate challenge understood by the client=C2=A0(su=
ch as =E2=80=9Cscope=E2=80=9D) would also be applied to this request.</div>=
<div><br></div><div>Normal authorization grant flow would then happen (as t=
his is the only grant type supported by RFC6750). Once the access token is =
acquired by the client, the client associates that token with the =E2=80=9C=
realm=E2=80=9D parameter given in the initial challenge by the resource ser=
ver origin. Likewise, the =E2=80=98aud=E2=80=99 of the token as returned by=
 a token introspection process would be the origin of the resource server.<=
/div><div><br></div><div>It seems any more complicated protected resource g=
roupings on a resource server would need a client to understand the structu=
re of the resource server, and thus fetch some sort of resource server meta=
data.</div></div></div></blockquote><div><br></div><div>I&#39;m not underst=
anding why you think this. Would you elaborate?</div><div>=C2=A0</div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #cc=
c solid;padding-left:1ex"><div style=3D"word-wrap:break-word;line-break:aft=
er-white-space"><div><div><br></div><div>Fourth and finally: Is the intenti=
on to eventually recommend token binding here? Token binding as a requireme=
nt across clients, resources, and the authorization servers would isolate t=
okens to only being consumed within an origin. This would actually make red=
undant/supplemental the AS additions defined within this spec (resource/ori=
gin request parameter, =E2=80=98aud=E2=80=99 introspection response member)=
</div></div></div></blockquote><div><br></div><div>Token binding solves par=
t of the resource constrained access token requirement, but does not solve =
how the client authenticates to the AS.=C2=A0</div><div><br></div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div style=3D"word-wrap:break-word;=
line-break:after-white-space"><div><span class=3D"HOEnZb"><font color=3D"#8=
88888"><div><br></div><div>-DW</div></font></span><div><br><blockquote type=
=3D"cite"><div><div class=3D"h5"><div>On Jun 12, 2018, at 1:28 PM, Dick Har=
dt &lt;<a href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt=
@gmail.com</a>&gt; wrote:</div><br class=3D"m_4564145191403024014Apple-inte=
rchange-newline"></div></div><div><div><div class=3D"h5"><div dir=3D"ltr">H=
ey OAuth WG<div><br></div><div>I have worked with Nat and Brian to merge ou=
r concepts and those are captured in the updated draft.</div><div><br></div=
><div><a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distrib=
uted/" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-hardt-=
oauth-<wbr>distributed/</a><br></div><div><br></div><div>We are hopeful the=
 WG will adopt this draft as a WG document.</div><div><br></div><div>Any co=
mments and feedback are welcome!</div><div><br></div><div>/Dick</div></div>=
</div></div><span class=3D"">
______________________________<wbr>_________________<br>OAuth mailing list<=
br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><b=
r><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"=
>https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br></span></div></blo=
ckquote></div><br></div></div></blockquote></div><br></div></div>

--000000000000fb41d205715a599a--


From nobody Thu Jul 19 06:47:22 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84B1E130EA1 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 06:47:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NWnLiV-JfdN7 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 06:47:18 -0700 (PDT)
Received: from mail-pl0-x22b.google.com (mail-pl0-x22b.google.com [IPv6:2607:f8b0:400e:c01::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C99FB130E50 for <oauth@ietf.org>; Thu, 19 Jul 2018 06:47:18 -0700 (PDT)
Received: by mail-pl0-x22b.google.com with SMTP id o7-v6so3685741plk.10 for <oauth@ietf.org>; Thu, 19 Jul 2018 06:47:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=J+F6/C8TlQBz/j89Xaclq39XRF9DnSi5HxVJRXkpNgg=; b=JtQ4R3IxF0VDPpcoudNOLKA9XU2BaU/9WmmLoU1Ytd8Uj7qQaC8ttPslSRvUDOueF8 LleC3L9M9KkQBIO8zO9z8dLB3KI30foaLmJ3kcnuUMNEn6HcLifhOo+OFcp0ILE+vAin WZyH8jZI2D3NSg6tO22t3EogICNakBeNz+Tdmf3mk6vlkWXU0T8UsN/YqKb0ydAdzMgC TGE3vjBxPuMLw+pP2w4gg1vPwhBQszBVDmvpqpvFw9UX49Us6d3GDj9qw+8SYm7cfvAV vV2FU6N0M5gyf47UP0JBT3NgnoQ7bf/SD2enYpRfvHKnmwS6/PtvHTsnlKutBLM5MNMv 7e7A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=J+F6/C8TlQBz/j89Xaclq39XRF9DnSi5HxVJRXkpNgg=; b=ThJtjkOJTUChCcG2Sva45BEhYDBx/4xANC5zCKl2NWwt6U6UtxHXY4pIEHXk5CVfR+ W204R7AJdEs0407JqlXo+D0F+hSgnokWObtRGoU5uHavIOe/HC+AxLhk3RBdaro/7v/D bm8sqOURYabOiMBAGzCQpa4i46UDecft4TmWy4HlaKymBzLgWVGRFQdCa5+xs8Wgu6fo iI5vzVG3/9x/K7jir9GvkgmmKpJjUpZS5ede0jkIc6wNRQ9DeyTM1ZaBx7mX5MoZyf39 s9RX2mcmj/jOUcd5dmBE8WTYY0vjFOyfX7TxS4fvJdA9S+dAMXBFnGrV8BJDp3lS5lXx ffSw==
X-Gm-Message-State: AOUpUlEs6nkhK4oKESU5A2j/XDflbLAYAyyMERIlPGZmgKOR8LB7RH5R H1jaXL6Bdx9tg+e4JxbnvV03llem1/HCRmTOCWHrzym8
X-Google-Smtp-Source: AAOMgpesT33W05bGgD2NUo1KShkVMZJSQ3pW6CfvnrYalcfX7MUdftRwtQ2YBhTkTWOl6kBOzVIvWoTT5onXiz8c4kI=
X-Received: by 2002:a17:902:b20d:: with SMTP id t13-v6mr10305259plr.121.1532008038158;  Thu, 19 Jul 2018 06:47:18 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Thu, 19 Jul 2018 06:46:57 -0700 (PDT)
In-Reply-To: <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 19 Jul 2018 09:46:57 -0400
Message-ID: <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000e8555305715a6a12"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Pt613IYZn8kcpcAp-CliyDfkVP8>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 13:47:21 -0000

--000000000000e8555305715a6a12
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Jul 19, 2018 at 8:51 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Dick,
>
>
>
>>
>> Section 3:
>> Don=E2=80=99t you think it could be a useful information to have the res=
ource URI
>> available in the authorization flow?I would assume it could have some
>> additional meaning to the AS and could also be the context of the scope.
>>
>
> I'm assuming you are referring to the Authorization Code Grant. Good call
> out that the resource URI would be useful in the redirect.
>
> The use cases that I have been working with have all been Client
> Credential Grants
>
> I currently don't know of a real world use case for the Authorization Cod=
e
> Grant for Distributed OAuth.
>
>
> I think any scenario with multiple resource servers relying on the same A=
S
> for authorization where the client acts on behalf of the resource owner
> qualifies for grant type code and distributed OAuth.
>
> Let=E2=80=99s assume a user wants to authorize a client for access to her=
 cloud
> storage, email account and contacts when setting app the respective app.
>

Would you walk me through the user experience that happened for the client
to do discovery on these three resources? In other words, what did the user
do to get the client to call the resource and get back the 401 response?

/Dick

--000000000000e8555305715a6a12
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Thu, Jul 19, 2018 at 8:51 AM, Torsten Lodderstedt <span dir=3D"ltr">=
&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lo=
dderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
dir=3D"auto"><div></div><div>Hi Dick,</div><span class=3D""><div><br></div>=
<blockquote type=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_extra">=
<div class=3D"gmail_quote"><div>=C2=A0</div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
Section 3: <br>
Don=E2=80=99t you think it could be a useful information to have the resour=
ce URI available in the authorization flow?I would assume it could have som=
e additional meaning to the AS and could also be the context of the scope.<=
br></blockquote><div><br></div><div>I&#39;m assuming you are referring to t=
he Authorization Code Grant. Good call out that the resource URI would be u=
seful in the redirect.=C2=A0</div><div><br></div><div>The use cases that I =
have been working with have all been Client Credential Grants</div><div><br=
></div><div>I currently don&#39;t know of a real world use case for the Aut=
horization Code Grant for Distributed OAuth.</div></div></div></div></div><=
/blockquote><div><br></div></span>I think any scenario with multiple resour=
ce servers relying on the same AS for authorization where the client acts o=
n behalf of the resource owner qualifies for grant type code and distribute=
d OAuth.=C2=A0<div><br></div><div>Let=E2=80=99s assume a user wants to auth=
orize a client for access to her cloud storage, email account and contacts =
when setting app the respective app.</div></div></blockquote><div><br></div=
><div>Would you walk me through the user experience that happened for the c=
lient to do discovery on these three resources? In other words, what did th=
e user do to get the client to call the resource and get back the 401 respo=
nse?</div><div><br></div><div>/Dick</div></div><br></div></div>

--000000000000e8555305715a6a12--


From nobody Thu Jul 19 07:33:41 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D05BE1310CA for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 07:33:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QPi_4jKUok9 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 07:33:26 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-bl2nam06on072a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe55::72a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78658131093 for <oauth@ietf.org>; Thu, 19 Jul 2018 07:33:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KW9LgVE8mbtSJlFE5mMCUTD2Hfw0JW6uIAu6yv5o8FY=; b=k+76Mqnu9Em3TXj3FvUmHGxowNHUJMdtcKOIQDGSYenEgiTPqxEDvgaUPCaGlHrGoF309u8IyAw2+EesJSmSJowWae6ONBW6e4ej3yv1CZRKmFwDIOhxFb80vEy6Y/HOOHLEL1qO0640BOjJYB5BzkxTw3uv8QIUzHz9N5nfwe0=
Received: from SN6PR00MB0304.namprd00.prod.outlook.com (52.132.117.158) by SN6PR00MB0350.namprd00.prod.outlook.com (52.132.118.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1015.0; Thu, 19 Jul 2018 14:33:24 +0000
Received: from SN6PR00MB0304.namprd00.prod.outlook.com ([fe80::926:a011:7db6:4284]) by SN6PR00MB0304.namprd00.prod.outlook.com ([fe80::926:a011:7db6:4284%4]) with mapi id 15.20.1016.000; Thu, 19 Jul 2018 14:33:24 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Request for adoption of draft-campbell-oauth-resource-indicators as a working group document
Thread-Index: AdQfbSo8vQ0hQlMlSHGSeBXaa0Ifbg==
Date: Thu, 19 Jul 2018 14:33:23 +0000
Message-ID: <SN6PR00MB0304898B535F0BCD9811EBE1F5520@SN6PR00MB0304.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:67c:1232:144:b1ec:6be8:a2db:2240]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SN6PR00MB0350; 6:ebFXQRvK7KHyLeA8KYL2nr2+DB0Zm+o/jQdnSPZ+SrekMf0pqNkkVFgoEmuIki8OpxGQe615w/hmelFCMvfDaADzFXF3cRalh0nWo7JiNQg8NwqfeZn7CjQtluZVpF3OeTQ9n9Y3A/olY7+BFmWv2zHXVAhG8MROhvK2xP8ChAnBcmJYznezn/CQiGsHT9qC/7rWQOIloqYxO623R02peq2yiom+7+wqgKCLlr2e705sJ0xXzQCiurk3PV3WgERXgIzVLVQZCgFgNCj4ucxHfiJHoidQdJApIZh+5UHi++o5U1c84m08gtHxesc+nKE8cx1R7MtJODm5kjYmIZpTVrs+ihntrF/Vzl/MwwQddKp//6/2zjsY0WU26+RJkFeDMEIn52CUqpgIYWeO46CnKZa/3eO/4pG78aJI7W/e3wijocaqcFrZdYivd3fok5gKuN0yXfj+AIvEoCPeDw8f+g==; 5:5lfKsW5hpXNNf2cg8oFGaht4ql35j8ouHIS4fhQfyFYkJsakomPWrtbl8cwK6EnYGEBYR2JHSmZS5B4KtEppCXFQ1JN7VgdBN9gIBZhC72GCs/uVo1jMjWJijK6Yy7DlQEogdg10mlYNp+HWSsknfGsFbteYJwAscAnxemPWVl8=; 7:NI2yLDZ3gh8tQDRdKsoz4K/03eCjTVLacyJc7EZ5b4y+85CaphbH1c74iMtfRQOF++ypMAPAp9N5fDnZx1267bHKNdRGIgKcvimEcD/z5iLB2aNbzkk8PKYf7ZMbMmQORUYJsKMOsRPJdIim3rEBnO4yWI9/eUb3hPX5gRJAPu08FxJvm1Pf0hr3/yuqK/uxhmkqzrUi52nlFZRSlhxL/NMmRn1ykFnh/DoSkXLUMTKz23xmtipT8BZVUKRtP0Dx
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 48b112af-36c3-44c0-cac6-08d5ed849576
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:SN6PR00MB0350; 
x-ms-traffictypediagnostic: SN6PR00MB0350:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-microsoft-antispam-prvs: <SN6PR00MB03505FE2B11C1F777C1C24D4F5520@SN6PR00MB0350.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(100405760836317)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(8121501046)(5005006)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3002001)(93006095)(93001095)(3231311)(944501410)(52105095)(2018427008)(10201501046)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:SN6PR00MB0350; BCL:0; PCL:0; RULEID:; SRVR:SN6PR00MB0350; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(39860400002)(346002)(396003)(136003)(366004)(189003)(199004)(7736002)(10290500003)(2906002)(316002)(22452003)(478600001)(5660300001)(25786009)(72206003)(14454004)(6436002)(966005)(256004)(14444005)(6506007)(4326008)(7696005)(110136005)(39060400002)(102836004)(53936002)(606006)(86362001)(790700001)(86612001)(6116002)(54896002)(33656002)(99286004)(8990500004)(186003)(486006)(106356001)(8676002)(476003)(105586002)(46003)(2900100001)(5250100002)(97736004)(55016002)(6306002)(236005)(9686003)(74316002)(8936002)(68736007)(81156014)(10090500001)(81166006); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR00MB0350; H:SN6PR00MB0304.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: l0MOGJsYuoNoXuH/jagyDpynNSWVXflrgnxtHbF7QOhpFEuCNwtKHJALJY8KMSYQ3ydN0FUCL2xolxrBy+7hE0EkgGKxdE4YizcmJg03DjMCbicAw8ZPhhPCkVjOi0qemLkFuBaeLlrK/a7Y2lvhGceF/qRymR99iHV/VvSarRyMZR35FxfBjAVnHJU877PjnaMzinUdvO0VJbc2mOQVWwOeHWmyFdzmWcgyrR4XWvsEIUwgjrYcNv6CWo/VHfSC5MdkOtYYghiKpIVXsgCdkpViky7Ufzw9LQXaff76AF7R9hVZurzdAxOGOhuMkwBkpOrb5CMcyahPF8PLRlX0HKAto6XTy+dkOe0MSuCNGHI=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_SN6PR00MB0304898B535F0BCD9811EBE1F5520SN6PR00MB0304namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 48b112af-36c3-44c0-cac6-08d5ed849576
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 14:33:24.0268 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR00MB0350
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/0RkREOFbZEDqQR0d0BCgpnD0qaY>
Subject: [OAUTH-WG] Request for adoption of draft-campbell-oauth-resource-indicators as a working group document
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 14:33:34 -0000

--_000_SN6PR00MB0304898B535F0BCD9811EBE1F5520SN6PR00MB0304namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02 def=
ines the already-commonly-used "resource" request parameter.  At today's wo=
rking group meeting, several people spoke up saying that they need a parame=
ter with those semantics.

I therefore request that the chairs do a consensus call on the adoption of =
draft-campbell-oauth-resource-indicators as a working group document.

                                                       Thank you,
                                                       -- Mike


--_000_SN6PR00MB0304898B535F0BCD9811EBE1F5520SN6PR00MB0304namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><a href=3D"https://tools.ietf.org/html/draft-campbel=
l-oauth-resource-indicators-02">https://tools.ietf.org/html/draft-campbell-=
oauth-resource-indicators-02</a> defines the already-commonly-used &#8220;r=
esource&#8221; request parameter.&nbsp; At today&#8217;s working
 group meeting, several people spoke up saying that they need a parameter w=
ith those semantics.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I therefore request that the chairs do a consensus c=
all on the adoption of draft-campbell-oauth-resource-indicators as a workin=
g group document.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thank you,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_SN6PR00MB0304898B535F0BCD9811EBE1F5520SN6PR00MB0304namp_--


From nobody Thu Jul 19 07:34:44 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7018E1310C1; Thu, 19 Jul 2018 07:34:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cjFcfHsqIlzt; Thu, 19 Jul 2018 07:34:30 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00082.outbound.protection.outlook.com [40.107.0.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0F3A1310C2; Thu, 19 Jul 2018 07:34:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CGgvxuLhCtMahOPAqoPASkf7fGLud62OPATYuaIEgiA=; b=olVU0OcBPI7Go5KcRy0UGB2Juy4tZyh9O3EXUYuWYhWTFpAnAUpGNcKUo4gQfCosAATvUScge9Vr9hvaw0bselSf+3yNYos9wdUBES4ZZkFp6TqDMkeghFZk7PvbrEEX1/nbmu0FpHVyRhyU8CALaRWWrEWZJbaKeWZdWc/LaA8=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1616.eurprd08.prod.outlook.com (10.167.211.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.20; Thu, 19 Jul 2018 14:34:26 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Thu, 19 Jul 2018 14:34:26 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Benjamin Kaduk <kaduk@mit.edu>, Eric Rescorla <ekr@rtfm.com>
CC: "ace@ietf.org" <ace@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: ACE - OAuth Synchronization
Thread-Index: AdQfbMNLxMX6hvBdRCO/rve3G6chAg==
Date: Thu, 19 Jul 2018 14:34:26 +0000
Message-ID: <VI1PR0801MB21122B372DBC82EFF5BD98AFFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1616; 6:Naa8ODf9TnV0XeAvDsjCEKmU7RAoeTEGuf+OIYhDUbSimo6WZSW/o6ako8sgJSVfQG9TK8BZGk8n7ifSFo7BosCrf9JlUELkTALgDWb7Vf2WOaYhu4dO+QIn/BCGjFAdkXYTi8oGapni//V7GnTAr7lzGOdnxZVPSyt8Ji4XK93FxrIXi3DLuj40OG7XG2c9Gv8e0x7JQDtoTZe1kMQ5L1f7oj94dnUVsNtqOaxV0wH/9MfHxd3Nr7q4NNOgeEYN8IhvIiv6V6RJiRxN/jNvULPlKusoqIbzngHWf3ypx0Kqb2UgKNyVVeiEdAeDwEQcyjvsFBFzF5sLu5dceVIj8Izo0L98mcePlnR04Mr2PTyW7qi/URXfeKGBh23aeiHo3CGSOmqNmseNQN5WpxY48ezDDW8uJfhXzZejOTnhgsPGRW9nUIuMN0ma4QipfnUqGPP3b0RIfqBFBWOA4WTMkg==; 5:vDfdHdZaL2yWjlPuLiMIvKtxkQW/xn7FRxc+3igjRPNewzUdQGAw2uI16B/AtcWQfx/FIGj16Sr4NZdQm1wIuGNmH4VmPdlGtqmAr+ex+TUDcUltnAoOQhbXoPjmsyfaOvX4D3YNKr2fzBQttQYphyebA9pJ48Qm7xYT8DCkins=; 7:xqv7JihLru9qm5RGJ99N1XGgh8iRORPEHr4JnH3mxkRGjME8eYMYc6OCkJbTMACDXZ0xvM8ecMIw5wOUZ6egPnIFhFf/5jOSJKHJOeVO8Gxzi+g0i5q+g9QhWajGS17qrcYCs8LYrOt0n4R7gPUyUGIqo5xhoWfrizOOHFBW9Lm1c4td476RTKzWT203ET1USBZnOUw4fbeucFcBffPyRAhIWS9xwiKD540pD08MOrpzzec+FgMbYhdCajAl6aKd
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 796685cc-2e51-4adc-9013-08d5ed84baa2
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(48565401081)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1616; 
x-ms-traffictypediagnostic: VI1PR0801MB1616:
x-microsoft-antispam-prvs: <VI1PR0801MB1616101E088058CF72947760FA520@VI1PR0801MB1616.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231311)(944501410)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1616; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1616; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(366004)(136003)(396003)(39860400002)(40434004)(189003)(199004)(81166006)(81156014)(25786009)(14454004)(33656002)(72206003)(478600001)(486006)(2171002)(476003)(4326008)(53936002)(8676002)(2900100001)(97736004)(106356001)(105586002)(2906002)(66066001)(99286004)(5250100002)(8936002)(68736007)(9686003)(6436002)(110136005)(316002)(54906003)(55016002)(54896002)(74316002)(3846002)(186003)(790700001)(5024004)(102836004)(6306002)(256004)(26005)(5660300001)(14444005)(6116002)(7736002)(6506007)(86362001)(7696005); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1616; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: s/bkTQF3EyG16IdDnQIhkXsGyct0LIwQbtovz0OmUAfU5PM5jp92hmL+CKNuLodHqX7cgC7OXcxscV8Z1IRqGbZQBeid53J3IPfztWN8nvUBiq5dM8W12Todlyn+bJR2SoEVMvBxavsDdc9yxB95l3FULle9HWoteBMZgzeAHvkNs7NjrRVs3uuO2Vttkzox/ivHWsFjLZRLgpRnkloYk4S7iIUeQb7lsf83x9crbF4ELAqy1nbFWcibrXVKxszTBsfWep+NllTb3KCill1kn9/vfxFeSYLcr/L1d8zesFM3as/wE4h8z81csd8hlihIDfJJr2Vs+W+Ox2Ljh+8hV9jpDdsM8yLOtjvvCZWUh0I=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB21122B372DBC82EFF5BD98AFFA520VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 796685cc-2e51-4adc-9013-08d5ed84baa2
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 14:34:26.3713 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1616
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/IV8FXwpAIt4RLoXUI2ci66DZyXc>
Subject: [OAUTH-WG] ACE - OAuth Synchronization
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 14:34:43 -0000

--_000_VI1PR0801MB21122B372DBC82EFF5BD98AFFA520VI1PR0801MB2112_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Ben, Hi Ekr,

We tried to find an agreement of which group defines parameters needed for =
ACE to support the PoP token functionality.
Unfortunately, we didn't manage to find an agreement in which group the wor=
k should be done.

The ACE working group wants to start a working group last call on draft-iet=
f-ace-oauth-authz in September. Hence, there is some urgency in making a de=
cision.

We need your guidance to avoid having the topic bounce back and forth betwe=
en the two groups.

Ciao
Hannes
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB21122B372DBC82EFF5BD98AFFA520VI1PR0801MB2112_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi Ben, Hi Ekr, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We tried to find an agreement of which group defines=
 parameters needed for ACE to support the PoP token functionality.
<o:p></o:p></p>
<p class=3D"MsoNormal">Unfortunately, we didn&#8217;t manage to find an agr=
eement in which group the work should be done.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The ACE working group wants to start a working group=
 last call on draft-ietf-ace-oauth-authz in September. Hence, there is some=
 urgency in making a decision.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We need your guidance to avoid having the topic boun=
ce back and forth between the two groups.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes<o:p></o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB21122B372DBC82EFF5BD98AFFA520VI1PR0801MB2112_--


From nobody Thu Jul 19 08:12:13 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9999E130EAF for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 08:12:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SpqjfTomKLhY for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 08:12:05 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0061.outbound.protection.outlook.com [104.47.1.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 08C85130E84 for <oauth@ietf.org>; Thu, 19 Jul 2018 08:12:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SHKF9cXAG5Xomz9EDb5jwD32Rj0AgkhygLwyflUFbTk=; b=rD9Df3pYub4Gn3x/IYLWg3ja+2S9ODP7Zelx7Bkx8XGq2GdbFaql6ZM/CQMLT59K1oC/TKcmMtxWhBmHLUkryiuWChP0l4RSDnKzpYyUwR25na0aRCpyK/N1mzM0xGzbA4LCP7Hf4Ox6vv4weROBWOVTpVUxEaTBjbOZ3E6bUO4=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1838.eurprd08.prod.outlook.com (10.168.68.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.19; Thu, 19 Jul 2018 15:12:02 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Thu, 19 Jul 2018 15:12:02 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Mike Jones <Michael.Jones@microsoft.com>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Request for adoption of draft-campbell-oauth-resource-indicators as a working group document
Thread-Index: AdQfbSo8vQ0hQlMlSHGSeBXaa0IfbgABXtgA
Date: Thu, 19 Jul 2018 15:12:01 +0000
Message-ID: <VI1PR0801MB21121361CA7C51F7534B1865FA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <SN6PR00MB0304898B535F0BCD9811EBE1F5520@SN6PR00MB0304.namprd00.prod.outlook.com>
In-Reply-To: <SN6PR00MB0304898B535F0BCD9811EBE1F5520@SN6PR00MB0304.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1838; 7:QuomLhSQMg4Gi5E4rExQESh+Hk2vJqgBVeSbmaxmVoOz3m1+SZ510zTND4QKXlVeV/esY3WsYGT76LgT1vhGmeqJVmnYJWSbzrwOIlGeDVWmQZwyDzrzQQ+Dp10Pa5duaED1xqBpuX7EovYxxw8oW4h/ztiY5oJF4wkpxC6W3j/qAm29bmldUZkOcbkPdyZy5xgCqlhe4BMNq/licADtpXelCiE+XS4G7FzubjbEuKv8xuR/Zh3GVRa6O7B+yNj+
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: ce214574-206b-465d-18b0-08d5ed89fb0f
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1838; 
x-ms-traffictypediagnostic: VI1PR0801MB1838:
x-microsoft-antispam-prvs: <VI1PR0801MB183879E0B61CB1A2BA8DBCA7FA520@VI1PR0801MB1838.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(100405760836317)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1838; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1838; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(979002)(396003)(346002)(39860400002)(366004)(136003)(376002)(40434004)(199004)(189003)(68736007)(11346002)(53546011)(236005)(102836004)(5660300001)(606006)(9686003)(7696005)(54896002)(8936002)(6306002)(6506007)(25786009)(4326008)(6246003)(76176011)(55016002)(39060400002)(229853002)(53936002)(8676002)(7736002)(186003)(486006)(66066001)(476003)(86362001)(26005)(1511001)(81156014)(74316002)(81166006)(6436002)(478600001)(2900100001)(72206003)(106356001)(790700001)(6116002)(97736004)(3846002)(14454004)(105586002)(966005)(2906002)(316002)(110136005)(446003)(5250100002)(14444005)(99286004)(256004)(33656002)(5024004)(45080400002)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1838; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: +VOZhduE2Oya32CxpyhzN7cHGH7lu8OpaaqQwAgGqK8GvQIGEPlAXEXhl6emtxfA98PQ8MDIWuJKRVhj1m7VVPSfOpn6ZlUWHqLsK6XgDEpFzZv2iOZF2dto00CkWDW+QPmb65yVYJB4G+zbROMi1yWeAVx/RHa4DR+Dcp94+3EelV7eN6rEp3nCmzaJTCxl3IXcI+zSearq1vwuuza70wx8zqKuYX3fytnlgmsNjHUeDVRGl4/JNCpA8zhqkVp+ize0whNmT1eDNs9tqNvNlz3eKRk74THXFyVWBR1JV991fv+K4FecpPjrACUB0R76FXMXS3kB031UrTZ0SV9gfbq+CSNM8K66qh74pxFhE/8=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB21121361CA7C51F7534B1865FA520VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ce214574-206b-465d-18b0-08d5ed89fb0f
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 15:12:01.9504 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1838
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/J6rSRI8rGb9AvOKqwjzkxWJkkUk>
Subject: Re: [OAUTH-WG] Request for adoption of draft-campbell-oauth-resource-indicators as a working group document
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 15:12:10 -0000

--_000_VI1PR0801MB21121361CA7C51F7534B1865FA520VI1PR0801MB2112_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

To those who haven't been at the f2f meeting: We did a consensus call durin=
g the meeting and the result was a strong positive confirmation from the pa=
rticipants with no objections.
Rifaat will have to run through a call on the mailing list to get the confi=
rmation.

Ciao
Hannes

From: Mike Jones [mailto:Michael.Jones@microsoft.com]
Sent: 19 July 2018 10:33
To: Rifaat Shekh-Yusef; Hannes Tschofenig
Cc: oauth@ietf.org
Subject: Request for adoption of draft-campbell-oauth-resource-indicators a=
s a working group document

https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02 def=
ines the already-commonly-used "resource" request parameter.  At today's wo=
rking group meeting, several people spoke up saying that they need a parame=
ter with those semantics.

I therefore request that the chairs do a consensus call on the adoption of =
draft-campbell-oauth-resource-indicators as a working group document.

                                                       Thank you,
                                                       -- Mike

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB21121361CA7C51F7534B1865FA520VI1PR0801MB2112_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">To those who haven&#82=
17;t been at the f2f meeting: We did a consensus call during the meeting an=
d the result was a strong positive confirmation from the participants with =
no objections.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Rifaat will have to ru=
n through a call on the mailing list to get the confirmation.<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Ciao<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hannes<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><a name=3D"_MailEndCompose"><span style=3D"color:#1F=
497D"><o:p>&nbsp;</o:p></span></a></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> Mike Jones [mailto:Michael.Jones@microsoft.com]
<br>
<b>Sent:</b> 19 July 2018 10:33<br>
<b>To:</b> Rifaat Shekh-Yusef; Hannes Tschofenig<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> Request for adoption of draft-campbell-oauth-resource-indic=
ators as a working group document<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><a href=3D"https://tools.ietf.o=
rg/html/draft-campbell-oauth-resource-indicators-02">https://tools.ietf.org=
/html/draft-campbell-oauth-resource-indicators-02</a> defines the already-c=
ommonly-used &#8220;resource&#8221; request parameter.&nbsp;
 At today&#8217;s working group meeting, several people spoke up saying tha=
t they need a parameter with those semantics.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I therefore request that the ch=
airs do a consensus call on the adoption of draft-campbell-oauth-resource-i=
ndicators as a working group document.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thank =
you,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mik=
e<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB21121361CA7C51F7534B1865FA520VI1PR0801MB2112_--


From nobody Thu Jul 19 08:51:32 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 102F1130EAB; Thu, 19 Jul 2018 08:51:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level: 
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id flBFaXWZnaLd; Thu, 19 Jul 2018 08:51:21 -0700 (PDT)
Received: from dmz-mailsec-scanner-3.mit.edu (dmz-mailsec-scanner-3.mit.edu [18.9.25.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DFD21310DB; Thu, 19 Jul 2018 08:51:21 -0700 (PDT)
X-AuditID: 1209190e-33bff700000068b9-f8-5b50b378cd95
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-3.mit.edu (Symantec Messaging Gateway) with SMTP id D6.82.26809.873B05B5; Thu, 19 Jul 2018 11:51:20 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id w6JFpJQD005291; Thu, 19 Jul 2018 11:51:19 -0400
Received: from mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w6JFpEEn020497 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 19 Jul 2018 11:51:17 -0400
Date: Thu, 19 Jul 2018 10:51:14 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Eric Rescorla <ekr@rtfm.com>, "ace@ietf.org" <ace@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Message-ID: <20180719155114.GN79497@mit.edu>
References: <VI1PR0801MB21122B372DBC82EFF5BD98AFFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <VI1PR0801MB21122B372DBC82EFF5BD98AFFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupileLIzCtJLcpLzFFi42IRYrdT163YHBBt8GKelMX3bz3MFiten2O3 uDnjFJPFybev2BxYPNbMW8PosWTJTyaPyY/bmAOYo7hsUlJzMstSi/TtErgyphy9ylrwk6Pi 9UbOBsYp7F2MnBwSAiYSy18tZO5i5OIQEljMJHFh/hpGCGcjo0TTnIlQmbNMEv8urWAEaWER UJW4+mU9WDubgIpEQ/dlZhBbRMBQYm/zIVYQm1kgW2Lzw59MXYwcHMICGhJvH1aBhHkFdCSm PngBViIkkCBx7W0zO0RcUOLkzCcsEK1aEjf+vQRrZRaQllj+jwMkzCmQKLF4xlOwTaICyhJ7 +w6xT2AUmIWkexaS7lkI3QsYmVcxyqbkVunmJmbmFKcm6xYnJ+blpRbpGuvlZpbopaaUbmIE BTCnJN8OxkkN3ocYBTgYlXh4VzgFRAuxJpYVV+YeYpTkYFIS5a067xctxJeUn1KZkVicEV9U mpNafIhRgoNZSYS3YANQOW9KYmVValE+TEqag0VJnDd7EWO0kEB6YklqdmpqQWoRTFaGg0NJ gvf/RqBGwaLU9NSKtMycEoQ0EwcnyHAeoOEnQWp4iwsSc4sz0yHypxiNOeYdnTqJmePPeyAp xJKXn5cqJc7LsgmoVACkNKM0D24aKAlJZO+vecUoDvScMK86SBUPMIHBzXsFtIoJaJV0tS/I qpJEhJRUAyPjA9fLRSwtaRtezNf4bVgrvvTjltwmzd+Tv32UYjjsFGVs5TT7SfKR7YnGjFfO Bl2Z2CUyb8P+BWyzvVZc1F91eDO/uWdaZXnXu9N3KiQqPrwuK56z9/eVK3Zvjlx8ymX5z1+Y LY17Wre7nYDQq2qlhaumnNm6/VPOS82E9/19qy/vUjJ20o9QYinOSDTUYi4qTgQARd4DmR0D AAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/FFmsk3k1k5Jyl8YFP39fLvrQY7c>
Subject: Re: [OAUTH-WG] ACE - OAuth Synchronization
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 15:51:25 -0000

Hi Hannes,

Can you remind me which parameters are being problematic in this regard?  I
mostly only remember the ace discussions of keyid, recently, so I probably
lost track of some relevant bits.

Thanks,

Ben

On Thu, Jul 19, 2018 at 02:34:26PM +0000, Hannes Tschofenig wrote:
> Hi Ben, Hi Ekr,
> 
> We tried to find an agreement of which group defines parameters needed for ACE to support the PoP token functionality.
> Unfortunately, we didn't manage to find an agreement in which group the work should be done.
> 
> The ACE working group wants to start a working group last call on draft-ietf-ace-oauth-authz in September. Hence, there is some urgency in making a decision.
> 
> We need your guidance to avoid having the topic bounce back and forth between the two groups.
> 
> Ciao
> Hannes
> IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.


From nobody Thu Jul 19 10:43:54 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22362130DC6 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 10:43:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qcJiUNTVOQnM for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 10:43:50 -0700 (PDT)
Received: from mail-io0-x22d.google.com (mail-io0-x22d.google.com [IPv6:2607:f8b0:4001:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CB50130E05 for <oauth@ietf.org>; Thu, 19 Jul 2018 10:43:49 -0700 (PDT)
Received: by mail-io0-x22d.google.com with SMTP id l14-v6so7766956iob.7 for <oauth@ietf.org>; Thu, 19 Jul 2018 10:43:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=iaQxBeSBr+NzrqNKS/P7enAXr3j3jimRR7JF1seaBHY=; b=X6Y2EYSXN938TNa/rSXaoFu0Sz4I8fl0F521CphFGk3hkW/pubG/KWijNKxSP+qrCv CKfDs4FIIxisSyfKyucgf7GaMcDMTDSLqomQHRKPPhDSXj7C6hH9IVaw+ttinProLLdZ 3XhDQtZGWRRpOtbCTo1qlDTsyDE043SxSXH8i9x6DxuI3jGbQRw/O7ukzCOOv0WOL+GN DmMSGaYm/0nXFcBh60Na+kTzP3g8nha474dMWZg/Hm1hLW0lD1ij9yer1y+wu2ZUlgNA BpEdYx9SQPcimpfcKkvpvX/5HhkcQKGtozTtId1nAGuzJd4OYaZ1oD03lIL1u/Cj7BwZ oZWg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=iaQxBeSBr+NzrqNKS/P7enAXr3j3jimRR7JF1seaBHY=; b=KGZ/dp++kyuAvl+ANBoH9xXi8J6gQDas9wsBbyt5+ME9YExCKqgCuu/4DVMb89fWZ7 ZzeqvCXdbiaiC8RIB6nLREpA2/SK6LU6gOKRZ+1T97RKAAWTZLbDvurT0hEyZ/GTjxcs opwUP0dnO98pEQqoMcLvIdmHox81HKuZOoKqZNMSoQEji3X4+OVkp2sQqNEc+Ifa4Gx7 +z8I42kdtzrvrSqGcbgzrv7cFfQnFjWLqUvBcSqPxiNHdbG+QJjCwVbN5yyq6SlHHkLE Ung19P3/vhkU7jFkTU3Wq4ieep4MctIAAY3bSJSF8tIJ+mOejOhLm3gTCFS8a0pJ/LGG 661A==
X-Gm-Message-State: AOUpUlHzlkdFKz/BYPDcMCrdLWOo2Z+qwuVUlwwMzkeSYrykf0ymLMJp /ViAhC44hnDG3wY/vimEiO7AW0ftqbzSbBi7CG5ALZ+BlMo=
X-Google-Smtp-Source: AA+uWPw/wcyEcxw77cE67CPzr9Sffrmooj1DAtjo3FIZtHwUEmCZcE4sgXPHFCzfAiWcjquoi76oR3e4Xt1pJRG8KXo=
X-Received: by 2002:a6b:410a:: with SMTP id n10-v6mr9864986ioa.0.1532022228266;  Thu, 19 Jul 2018 10:43:48 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 19 Jul 2018 13:43:37 -0400
Message-ID: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b4334d05715db833"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Jje4Hqtrx_8KL92NblhyD5pj14o>
Subject: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 17:43:52 -0000

--000000000000b4334d05715db833
Content-Type: text/plain; charset="UTF-8"

Hi all,

This is the call for adoption of the 'JWT Response for OAuth Token
Introspection' document following the presentation by Torsten at the
Montreal IETF meeting where we didn't have a chance to do a call for
adoption in the meeting itself.

Here is presentation by Torsten:
https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth-token-introspection-00

Here is the document:
https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01

Please let us know by August 2nd whether you accept / object to the
adoption of this document as a starting point for work in the OAuth working
group.

Regards,
Hannes & Rifaat

--000000000000b4334d05715db833
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi all,</div><div><br></div><div>This is the call for=
 adoption of the &#39;JWT Response for OAuth Token Introspection&#39; docum=
ent following the presentation by Torsten at the Montreal IETF meeting wher=
e we didn&#39;t have a chance to do a call for adoption in the meeting itse=
lf.</div><div><br></div><div>Here is presentation by Torsten:</div><div><a =
href=3D"https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth=
-sessa-jwt-response-for-oauth-token-introspection-00">https://datatracker.i=
etf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth=
-token-introspection-00</a></div><div><br></div><div>Here is the document:<=
/div><div><a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oauth-jw=
t-introspection-response-01">https://tools.ietf.org/html/draft-lodderstedt-=
oauth-jwt-introspection-response-01</a></div><div><br></div><div>Please let=
 us know by August 2nd whether you accept / object to the adoption of this =
document as a starting point for work in the OAuth working group.</div><div=
><br></div><div>Regards,</div><div>Hannes &amp; Rifaat</div></div>

--000000000000b4334d05715db833--


From nobody Thu Jul 19 10:51:29 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 23861130DE4 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 10:51:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MM677-BKmbYJ for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 10:51:25 -0700 (PDT)
Received: from mail-ua0-x22a.google.com (mail-ua0-x22a.google.com [IPv6:2607:f8b0:400c:c08::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5939D130DC6 for <oauth@ietf.org>; Thu, 19 Jul 2018 10:51:25 -0700 (PDT)
Received: by mail-ua0-x22a.google.com with SMTP id g18-v6so5754475uam.6 for <oauth@ietf.org>; Thu, 19 Jul 2018 10:51:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=NluyYWY9Zp6qlMV+ZtIKX+oGLoJ3lZfwMOpcT9QIWfo=; b=VgKMlUpKdcQI3hlgu5MjCMFRuH6UTbnhLJ6f7kJzAToaST2WqNSaZEa/5B3zyzORQk kqk0Q+grI7VModJmGS8HXYhfFG8utizwU2u9quloXKoSmAK+GVJCyVHT7TQpBlYJHBby 4pkvcD1/KmmKwSs+ZwzIZfL7OmCQezrlE3Q2GVQTEoFAOCn5ciMa0tVQ6LBvydnTo+TS hdgg9uiJs+K6UyxAjRMzLhKA4EybeZ8iDeIyniGfWC8Q/SbIkQThcSDAGlmPoNEd2um8 l0izNyZCxf+Za9/JoyaaTIgvcxXB+DxU4sa9T9+egbeey1aTFmAgBeDxjWrM8Fm+xv2j +SGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=NluyYWY9Zp6qlMV+ZtIKX+oGLoJ3lZfwMOpcT9QIWfo=; b=Vbsy975cDdyV1X54AhTt1EIlXYlLrSmn8KMrlW7BetJa6vr0N33i+4NnGanwQzm1fi HE6U0yexRlzdY+CMLs05lXBaFyO9EzJ2J9i8yLYj/vvJbGbdrodIus+rgAGrIctO1M32 jwSitslc96s4ALBellzl3d71QQdQZJY+dKNxx0uYN4kFFBnEX8GwC+psNvpr8uooGpZN 8mTeAjRpDZCHD9MduAc8dfjAoGtjDTtki3HasQ7gW9ocHtcEK+5obZ0w6BmFfAoF7Wjv YUWDNGtp7x1rxRzCcoR/SbJlDltu5+yCqPT4f010lC+MWM3OwL8OADexCmkzkADptZU9 ulQg==
X-Gm-Message-State: AOUpUlH/V3aopcS5P/tdnvFShY+onRUMQQRciJBH0FmYD0whzCRsIfWc 1q1ov7SM4PkFC96+TGc6leu3b+ITKNColQYpKtU+cA==
X-Google-Smtp-Source: AAOMgpdcFMQn8eqrfVG8YiI/Z2epUr6ltL29y9PPEuI4mTSgnM+3uuN/IydyrNaUjb4NOKXSCxJHRiCaAYEQB31n8oQ=
X-Received: by 2002:ab0:234c:: with SMTP id h12-v6mr791473uao.161.1532022684020;  Thu, 19 Jul 2018 10:51:24 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 10:51:03 -0700 (PDT)
In-Reply-To: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
From: William Denniss <wdenniss@google.com>
Date: Thu, 19 Jul 2018 10:51:03 -0700
Message-ID: <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dee49805715dd31b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/kC1Tmq0XOEZeoWAlJm06k2vIxY0>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 17:51:28 -0000

--000000000000dee49805715dd31b
Content-Type: text/plain; charset="UTF-8"

I support adoption of this document by the working group.


On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Hi all,
>
> This is the call for adoption of the 'JWT Response for OAuth Token
> Introspection' document following the presentation by Torsten at the
> Montreal IETF meeting where we didn't have a chance to do a call for
> adoption in the meeting itself.
>
> Here is presentation by Torsten:
> https://datatracker.ietf.org/meeting/102/materials/slides-
> 102-oauth-sessa-jwt-response-for-oauth-token-introspection-00
>
> Here is the document:
> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-
> introspection-response-01
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth working
> group.
>
> Regards,
> Hannes & Rifaat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--000000000000dee49805715dd31b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I support adoption of this document by the working group.<=
br><div><br></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <span dir=3D"lt=
r">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ie=
tf@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div d=
ir=3D"ltr"><div>Hi all,</div><div><br></div><div>This is the call for adopt=
ion of the &#39;JWT Response for OAuth Token Introspection&#39; document fo=
llowing the presentation by Torsten at the Montreal IETF meeting where we d=
idn&#39;t have a chance to do a call for adoption in the meeting itself.</d=
iv><div><br></div><div>Here is presentation by Torsten:</div><div><a href=
=3D"https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-ses=
sa-jwt-response-for-oauth-token-introspection-00" target=3D"_blank">https:/=
/datatracker.ietf.org/<wbr>meeting/102/materials/slides-<wbr>102-oauth-sess=
a-jwt-response-<wbr>for-oauth-token-introspection-<wbr>00</a></div><div><br=
></div><div>Here is the document:</div><div><a href=3D"https://tools.ietf.o=
rg/html/draft-lodderstedt-oauth-jwt-introspection-response-01" target=3D"_b=
lank">https://tools.ietf.org/html/<wbr>draft-lodderstedt-oauth-jwt-<wbr>int=
rospection-response-01</a></div><div><br></div><div>Please let us know by A=
ugust 2nd whether you accept / object to the adoption of this document as a=
 starting point for work in the OAuth working group.</div><div><br></div><d=
iv>Regards,</div><div>Hannes &amp; Rifaat</div></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--000000000000dee49805715dd31b--


From nobody Thu Jul 19 13:02:09 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AA68130E8B for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:02:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j99Ji_5nZfEo for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:02:05 -0700 (PDT)
Received: from mail-it0-x22e.google.com (mail-it0-x22e.google.com [IPv6:2607:f8b0:4001:c0b::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 633B6130DC9 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:02:05 -0700 (PDT)
Received: by mail-it0-x22e.google.com with SMTP id d70-v6so3246526ith.1 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:02:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=5fP+UF+5g7vcSNDWWOU3GBNWZNp7NuJO677x3eSiU6A=; b=MgtSl+6setyzyRHeNdyurKgYFmcse7nW1JCg42VidOPahBmyPuJ9AmdhYzvqIv2ko1 yArvlDusFt1BDEbbPuyL29bQbpLcfVBU/i3sSWPyA4F7fjSmcu9fnCeIrzB180cbbrKi 60YzxAFCbUNwQH0wVLQ3/+eZ9amZaS3BeNJNrnqNlH8RpATU9qkv6svNalJUves1VhKt 6kMOUccVPMFKfmVkChf8lC79XEXptWpUR7aUJsSPpgmtXz7gyqXFnbFuOaOxJ27VcV2P +oFEcQGEyYpmm0ys27/qE9zRIhyJuxXx+aKQfoRnWMgy14ylbfnHnaiEsrgUTEtZc/Of 3M+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=5fP+UF+5g7vcSNDWWOU3GBNWZNp7NuJO677x3eSiU6A=; b=LTu7kLFWrhCuXssaaFCBqiFCuFzaT0VsqMvLSfe1X8G3Cfgd5GPX3mPXiOTFQe7gzg vk1fB42SKdf+0J8Gzf1mswWbVygd2Is91dTWZ7IF8ZPM6hjdj0glhCmw5Eqp3JR5ZBIL Q1yMAcuGCUUW2iBumtxzoDT39acAwhZEOkSyB/4nTrMob+jmDeSCGm/G6Bo83BhtPZUh QiFb/0LmZUwMvvU0iIM7zRTyXK0JNKGuQUTn7G9EB8VwLJfy+IlibURzoDsFtCSRP2p3 brKrS9+Q24QwgyHLMoO76z1/8VN2zbNTeDNcpQ2NuPWqucoUsACcNPBDKVPWQgAND1mW o+Ng==
X-Gm-Message-State: AOUpUlExcfP66RyHm7iTUy7as69BeIDO2X8xkrPncv9nQvYcmSbtwdyi qFgGR0USl7lHAO0oQ+mx8C7/QvJx79tmJ4CKZB1NA0Ki7LI=
X-Google-Smtp-Source: AAOMgpcOdlwfItFWrWT42yt3DEtqa7FCBYbyGXYv4YgDMxYIl227mG2VDiKQ1tM8ahJipLvh3gMV635/4V8aui0S5kE=
X-Received: by 2002:a24:c445:: with SMTP id v66-v6mr6839338itf.110.1532030524544;  Thu, 19 Jul 2018 13:02:04 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 19 Jul 2018 16:01:53 -0400
Message-ID: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000335d1e05715fa764"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/jQpPpzvSzPjmQ0ROusvavOIzvYM>
Subject: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:02:08 -0000

--000000000000335d1e05715fa764
Content-Type: text/plain; charset="UTF-8"

 Hi all,

This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
document
following the positive call for adoption at the Montreal IETF meeting.

Here is the document:
https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02

Please let us know by August 2nd whether you accept / object to the
adoption of this document as a starting point for work in the OAuth
working group.

Regards,
Rifaat

--000000000000335d1e05715fa764
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">

<span style=3D"font-size:small;text-decoration-style:initial;text-decoratio=
n-color:initial;float:none;display:inline">Hi all,</span><br style=3D"font-=
size:small;text-decoration-style:initial;text-decoration-color:initial"><br=
 style=3D"font-size:small;text-decoration-style:initial;text-decoration-col=
or:initial"><span style=3D"font-size:small;text-decoration-style:initial;te=
xt-decoration-color:initial;float:none;display:inline">This is the call for=
 adoption of the &#39;Resource Indicators for OAuth 2.0&#39; document</span=
><br style=3D"font-size:small;text-decoration-style:initial;text-decoration=
-color:initial"><span style=3D"font-size:small;text-decoration-style:initia=
l;text-decoration-color:initial;float:none;display:inline">following the po=
sitive call for adoption at the Montreal IETF meeting.</span><br style=3D"f=
ont-size:small;text-decoration-style:initial;text-decoration-color:initial"=
><br style=3D"font-size:small;text-decoration-style:initial;text-decoration=
-color:initial"><span style=3D"font-size:small;text-decoration-style:initia=
l;text-decoration-color:initial;float:none;display:inline">Here is the docu=
ment:</span><br style=3D"font-size:small;text-decoration-style:initial;text=
-decoration-color:initial"><a href=3D"https://tools.ietf.org/html/draft-cam=
pbell-oauth-resource-indicators-02" rel=3D"noreferrer" target=3D"_blank" st=
yle=3D"color:rgb(17,85,204);font-size:small">https://tools.ietf.org/html/dr=
aft-campbell-oauth-resource-indicators-02</a><br style=3D"font-size:small;t=
ext-decoration-style:initial;text-decoration-color:initial"><br style=3D"fo=
nt-size:small;text-decoration-style:initial;text-decoration-color:initial">=
<span style=3D"font-size:small;text-decoration-style:initial;text-decoratio=
n-color:initial;float:none;display:inline">Please let us know by August 2nd=
 whether you accept / object to the</span><br style=3D"font-size:small;text=
-decoration-style:initial;text-decoration-color:initial"><span style=3D"fon=
t-size:small;text-decoration-style:initial;text-decoration-color:initial;fl=
oat:none;display:inline">adoption of this document as a starting point for =
work in the OAuth</span><br style=3D"font-size:small;text-decoration-style:=
initial;text-decoration-color:initial"><span style=3D"font-size:small;text-=
decoration-style:initial;text-decoration-color:initial;float:none;display:i=
nline">working group.</span><br style=3D"font-size:small;text-decoration-st=
yle:initial;text-decoration-color:initial"><br style=3D"font-size:small;tex=
t-decoration-style:initial;text-decoration-color:initial"><span style=3D"fo=
nt-size:small;text-decoration-style:initial;text-decoration-color:initial;f=
loat:none;display:inline">Regards,</span><br style=3D"font-size:small;text-=
decoration-style:initial;text-decoration-color:initial"><span style=3D"font=
-size:small;text-decoration-style:initial;text-decoration-color:initial;flo=
at:none;display:inline">Rifaat</span>

<br></div>

--000000000000335d1e05715fa764--


From nobody Thu Jul 19 13:06:06 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49B46130EB2 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:06:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uzqvaUvryo0e for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:06:02 -0700 (PDT)
Received: from mail-it0-x232.google.com (mail-it0-x232.google.com [IPv6:2607:f8b0:4001:c0b::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01037130DC9 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:06:01 -0700 (PDT)
Received: by mail-it0-x232.google.com with SMTP id w16-v6so11617996ita.0 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:06:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=4ozkWx7W1Dm1dajWT3Nihd/DLcmUBeoKHFRn4A/sy/E=; b=iL0XyVRKMXsog8YAyqzX44U+EChhto6lVylgY5hTX169FQrHFP5Jzt5DnRpoN7+dUU b8klGBya+jLagyx1CLC+lfV46K4a3z6I+qUqpELIToBiq4VryZ/nSkQ3ZBs430HAM+Oi qbQmoAjLOYlOM2aFC7uLTabpQNn4KV6uWOfXhekgQICyr3XrXEx2L1o58v/pqOHqGVI7 UvCBJMNZQNO6nNSQZ0cfJmlSSNArnPjq0akdLNc3UzdcnoWdxjB4ytL89fl6KXhhVxvP 2ySn8g5siTlF7ksWWYqOjXCgkALCe/kIl8PaERNfipZip1ac39zN6Y6OTIO28Tno7kja F+fw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=4ozkWx7W1Dm1dajWT3Nihd/DLcmUBeoKHFRn4A/sy/E=; b=SJKTOaziVEVW4zjwiQxJRlC5U0edaoOlh+yPn9uwnJvF6X1fh6viCG1udwQQRqAP5n c7QtdC4BzTjd9QF8IPkEKaVYZPVkxlG6WBk+MFga3/JAnrpjnJAnOYLtSCElvM7TSyss MAdgdmeloJ47VuwXttjidwaFFn2T2szkglTBFXC6zsJ9JlHaoBVWDLC8Jm+9u+8bTAUO J49Nam83xEjOXSmol57d9oA8Qrf7/mSHxxmtNB9mXmkAoE4eJ2a6ZFLSAkZ0PxQgZp0l OlCF7slWvjVvJW9rbWa2YjW0W0Ig9Nl22LOzFJOQZo4M+hXAHcqVwfcMTjgeUvN2M8hl SRzg==
X-Gm-Message-State: AOUpUlFq/JOA5UImOM/qpM/7KBtKnzVxEfKAVbZmcO3aROCapuVy+dzX gLpgc/pjTfFCpdPBCIZjG06r09da35R9/fr49tobjaQSZ1g=
X-Google-Smtp-Source: AAOMgpdb/4gbfI5+N+D3UcZzHF1weiD6zRHXXzjA0OWaRtpJ/fRj9U0D+8m8vha+/xkygsrE6F3MjFBodiA8bXBMOg4=
X-Received: by 2002:a24:c445:: with SMTP id v66-v6mr6855568itf.110.1532030760968;  Thu, 19 Jul 2018 13:06:00 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 19 Jul 2018 16:05:49 -0400
Message-ID: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004aeb4505715fb52c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/tzq87Qx-RzDuE9iQEig1MvHciOw>
Subject: [OAUTH-WG] Call for adoption for "Distributed OAuth"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:06:05 -0000

--0000000000004aeb4505715fb52c
Content-Type: text/plain; charset="UTF-8"

Hi all,

This is the call for adoption of the 'Distributed OAuth' document
following the positive call for adoption at the Montreal IETF meeting.

Here is the document:
https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/

Please let us know by August 2nd whether you accept / object to the
adoption of this document as a starting point for work in the OAuth
working group.

Regards,
Hannes & Rifaat

--0000000000004aeb4505715fb52c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi all,</div><div><br></div><div>This is the call for=
 adoption of the &#39;Distributed OAuth&#39; document</div><div>following t=
he positive call for adoption at the Montreal IETF meeting.</div><div><br><=
/div><div>Here is the document:</div><div><a href=3D"https://datatracker.ie=
tf.org/doc/draft-hardt-oauth-distributed/">https://datatracker.ietf.org/doc=
/draft-hardt-oauth-distributed/</a></div><div><br></div><div>Please let us =
know by August 2nd whether you accept / object to the</div><div>adoption of=
 this document as a starting point for work in the OAuth</div><div>working =
group.</div><div><br></div><div>Regards,</div><div>Hannes &amp; Rifaat</div=
><div><br></div></div>

--0000000000004aeb4505715fb52c--


From nobody Thu Jul 19 13:29:20 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32E19130E2A for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:29:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CjU72hod01RL for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:29:16 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-dm3nam06on0703.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe56::703]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E2D1130DC9 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:29:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R4MEZU3s2+J23Lnhp6+47P+yOXgVyvF4dYeBcgJGQGM=; b=irjcKStuwcrPAA6cw5JvPn+aHdlW4ANyGNK69fdecBLWT5kbbOcehGU+aa5+GOG4IkkO99XdUAsD74f60N54aX4nH4LfP8Wy0XVFxqV3yNJn9h2u+cgOKCFbhd9bXSyW6UNimeguTv34ubb7b2xS0hlbJA15mSwyriZ6A9ICBFw=
Received: from DM5PR00MB0296.namprd00.prod.outlook.com (52.132.128.37) by DM5PR00MB0294.namprd00.prod.outlook.com (52.132.128.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1015.0; Thu, 19 Jul 2018 20:29:14 +0000
Received: from DM5PR00MB0296.namprd00.prod.outlook.com ([fe80::ccd4:2ea:171a:e326]) by DM5PR00MB0296.namprd00.prod.outlook.com ([fe80::ccd4:2ea:171a:e326%8]) with mapi id 15.20.1017.000; Thu, 19 Jul 2018 20:29:14 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tpAEJtgz4Ml0eD0vJ2JOwxQKSW/s9Q
Date: Thu, 19 Jul 2018 20:29:14 +0000
Message-ID: <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
In-Reply-To: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:67c:1232:144:a03e:93f:7764:5cc7]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR00MB0294; 6:IhaCSKEyssctyx4626NkxtukAnNRxl2TQPdHjfcjnZtRxeN1Ba84jGRJ3GCck7BAn7xDGebIh4FIUxosxFgx+fbf/3dvWkOwyXqWjZv7pgDZtWLhF5OJrHzLHdvPfkM4WyXB667/c6HS0aCxI90qixWFPMxnHnR04RUFoinAlNkRbu3K0OYu+NGxQUCc6gfFJQEeG+fSv4Vt2C82EZKPuYm8sd4bfQ9cEGNxQK39AYb3v29NE2IhJ1ceW68i9pXYSLNls8yRUD6FTqB7LmbRWuhzCGa1wostV0TJm1y1ES8cadQHH850nm+RjUK7u6KyJFFvvQhLT6fSt9ZWHNlxEn0+XKdHoYdjV1NtyM7hV1OWGlJsDlfeA7WPUIJRqbyU8b3FIrUA89+Ko26ziAe4qXotc6Ks544z7LEA/TSbWdlAXtF2IGi22Ma8cy/nPT6uQTtYU0mggsqZTpz0dgixtA==; 5:boGYXhQuVL7H5GE7B33MudVCNG8kOE7EpDr5l/YXW88bKb/o8xQlKXtf8Bu9Ndjvmnpa1qRoyYiK+YgiGZt8L7llFKPM24mwwWk3HWwUzr9Pda3enbQciWHp4PfVyXdDJ5kpWhB2c1VA4zp/c3YtkMIZx8m8wPX4tpD+Ju9T7oA=; 7:gp/VMXNOUfUBtvR/u7WBMblUYdKCEc7k5Yf4gBGBXMxUKYCP1/H8KngyGvGbcb5ooEdpSho0+k/35ly5AgFyHGMJezVb7a8AqCz11u1bfwzK7xWLKB516HYbw92ppt5MMiUaPzpc2CmA2bfWXU8VHkNgOrS81oSK0aC196ocfD/9qqcUCjH7Fb+ytuKtLik4H+qmT/KvOjhX4ATQ6IZXMQh7+aROQH9ihmrzZOF9m74GSD9YU0gl7JE/r96hfAko
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: f1d04439-8616-4a5c-5366-08d5edb64b6c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:DM5PR00MB0294; 
x-ms-traffictypediagnostic: DM5PR00MB0294:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <DM5PR00MB0294949532E7277F5EE47E0AF5520@DM5PR00MB0294.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(8121501046)(5005006)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3231311)(944501410)(52105095)(2018427008)(93006095)(93001095)(3002001)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:DM5PR00MB0294; BCL:0; PCL:0; RULEID:; SRVR:DM5PR00MB0294; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(136003)(376002)(346002)(366004)(39860400002)(53754006)(189003)(199004)(7736002)(33656002)(86612001)(11346002)(476003)(2906002)(110136005)(22452003)(6436002)(81166006)(86362001)(19609705001)(6246003)(446003)(39060400002)(486006)(7696005)(53936002)(14454004)(74316002)(6116002)(966005)(790700001)(186003)(229853002)(316002)(5250100002)(478600001)(72206003)(55016002)(10290500003)(6506007)(53546011)(105586002)(102836004)(256004)(106356001)(236005)(54896002)(99286004)(14444005)(46003)(8990500004)(8936002)(97736004)(9686003)(2900100001)(81156014)(8676002)(6306002)(5660300001)(76176011)(10090500001)(68736007)(606006)(25786009); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR00MB0294; H:DM5PR00MB0296.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: zduFaKJRWUO5oJ3mhLsQ33o32YplMO7LBseJ9gqA+ZLHwL2MNyKDMFZyg0/Bpzfsl6/vo/JCu6ERngWeIhjdYarTwKLWf8PobNjawK2iczVJEgFK0DNdISbRuFyctgh17gVTruQr+bH5oncE5yzLFJSfAPAQ/5tKcNGVM4JGCh9FJ3iQ4RCnQ4hrnENrrVQJ05nqQKwY7d9Em269whNgXo/RaZiE+EB0xaGB3MI7lcA4JjbNnkqm/Z4ysgXciFqZ07HWJdT4RwyTFBKHJv+qTHnwgSa2TccJPW/BzyESQA5US1aH1YV3E6JsfSF48NyO3oZ0XZbbYuN4Wi9St380w85pMwjPeDT29SPOTBmt6uA=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR00MB0296804218028EEB46142372F5520DM5PR00MB0296namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f1d04439-8616-4a5c-5366-08d5edb64b6c
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 20:29:14.6353 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR00MB0294
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Mf9EC953goK_dtorSe3K_kQ3oaY>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:29:19 -0000

--_000_DM5PR00MB0296804218028EEB46142372F5520DM5PR00MB0296namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR00MB0296804218028EEB46142372F5520DM5PR00MB0296namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_DM5PR00MB0296804218028EEB46142372F5520DM5PR00MB0296namp_--


From nobody Thu Jul 19 13:32:41 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F15CE130EF4 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:32:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DhXO-Z23Owgc for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:32:35 -0700 (PDT)
Received: from mail-vk0-x244.google.com (mail-vk0-x244.google.com [IPv6:2607:f8b0:400c:c05::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2E39130DFA for <oauth@ietf.org>; Thu, 19 Jul 2018 13:32:35 -0700 (PDT)
Received: by mail-vk0-x244.google.com with SMTP id b78-v6so5035628vka.12 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:32:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=WNXhJajXnN1FTTlnu+X4hi1oDgoA8pExzW35r+OcMAw=; b=F26kMWtpBfw/QOA9ozh+rT8om6SBqlQ8bXmoK8KtPFazyhAnvU2yOJlSYPcni3/a9K 7wRL05iBMzL/XJQyS0b06IJ0wB3EBNACRSZpWP2Jq6xnqZruOFy0Z1FavnlJjrTkFtmy J4bcvxsP7NA3WfuxdKx+Bhr2aH/XB841X7KSzGQm9Z7cKYwivJz7EQEq11c4nKedfY0o L5kvzPALZPo/mhd2AotB44HnQf3IEICU95AaItnCoYwdg0OyeBEV44nB0T0kbT6MNpLk 8F+Tz2KWD+0XTQemmbMvUR38yviF2Q8sz1c2h9FKmGZoWaIeVDVl3A0dR/i2nXbxQCn+ H7UA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=WNXhJajXnN1FTTlnu+X4hi1oDgoA8pExzW35r+OcMAw=; b=SEAAOgh0OOGaNH/SRDjQ/z3Rn20f3A+iN+LNbNXiCdNrqUMuIOSbYhH8rGsM+qtQA5 lEBAHpkII5Lw2JWmYMmoHytJed3Y8J2eoL+250OWZJVKLCAnbmxjg/QYYk84sYUTloN3 /qvM9LpdtrvcjWHU/6dDsxbP01pCLv/HaT/fWBWyott4XsSwGdQ652xuEvzuqDdqL/TR PhKBPriPgUU9JMQZsoV1HD7+4ivW5QSUYF4FzKnrDKGX0HRWF03bgRINgiTnqElfoLRO YcW4TfvaLseFGx3En9/gVzdTsenpdT61GjZQG1KWlUb0Z1yU0KbrKh7tOpXna2+km0dn YszQ==
X-Gm-Message-State: AOUpUlEj7uOKWe8hMiw7jiNG5uRvE5zNlHaK0jts0wIh5l2C2E6MgmXv qgk9PooyP3HwQ0ukD8OXkUWuezBKVVwJHxtwaJIDQQ==
X-Google-Smtp-Source: AAOMgpc+ZC9IxCHHkorShgH1wq5bOkrQNxUMAh6L7shYlx1kctdumcEpRP18kKr9FS5nvGKtaq37NzvoAa8JlJgu0mA=
X-Received: by 2002:a1f:a945:: with SMTP id s66-v6mr7183273vke.54.1532032354255;  Thu, 19 Jul 2018 13:32:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 13:32:13 -0700 (PDT)
In-Reply-To: <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com>
From: William Denniss <wdenniss@google.com>
Date: Thu, 19 Jul 2018 13:32:13 -0700
Message-ID: <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
Cc: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000434e51057160141e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/T_ugijiuv6CNNz8tn5fjEN02qwg>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:32:39 -0000

--000000000000434e51057160141e
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Question: if this is adopted along with https://datatracker.ietf.
org/doc/draft-hardt-oauth-distributed/, is the plan for this spec to be the
authoritative definition, and Distributed OAuth to take a reference instead
of redefining?

On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <Michael.Jones=3D40microsoft.
com@dmarc.ietf.org> wrote:

> I support adoption.  The =E2=80=9Cresource=E2=80=9D request parameter tha=
t it defines is
> already widely used.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of * Rifaat Shekh-Yusef
> *Sent:* Thursday, July 19, 2018 4:02 PM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--000000000000434e51057160141e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Question: if this is adopted along with=C2=A0<a href=3D"ht=
tps://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" style=3D"col=
or:rgb(17,85,204);font-size:12.8px" target=3D"_blank">https://datatracker.i=
etf.<wbr>org/doc/draft-hardt-oauth-dist<wbr>ributed/</a>, is the plan for t=
his spec to be the authoritative definition, and Distributed OAuth to take =
a reference instead of redefining?<br><div class=3D"gmail_extra"><br><div c=
lass=3D"gmail_quote">On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <span dir=
=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.o=
rg" target=3D"_blank">Michael.Jones=3D40microsoft.<wbr>com@dmarc.ietf.org</=
a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_7178958459018000728m_-7844552849868633664WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">I support adoption.=C2=
=A0 The =E2=80=9Cresource=E2=80=9D request parameter that it defines is alr=
eady widely used.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 4:02 PM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption for &quot;Resource Indicators =
for OAuth 2.0&quot;<u></u><u></u></p><div><div class=3D"m_71789584590180007=
28h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/dr<wbr>aft-campbell-oauth-resource-in<wbr=
>dicators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
</div></div></div>
</div>

<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
<br></blockquote></div><br></div></div>

--000000000000434e51057160141e--


From nobody Thu Jul 19 13:33:45 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 905E0130F7F for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:33:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDGHoSM4ZBdh for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:33:35 -0700 (PDT)
Received: from mail-io0-x234.google.com (mail-io0-x234.google.com [IPv6:2607:f8b0:4001:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21188130EF4 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:33:35 -0700 (PDT)
Received: by mail-io0-x234.google.com with SMTP id l25-v6so8165449ioh.12 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:33:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=74Hjlg/hhk7ywKgRPyYQg+t2V9CAh2kbQ74zXUjS5vA=; b=CUde/fn4gwWtbA03tyUi//rX/7dwoS6Gwxc2N9Qb5Vgmae12QasMfgubI4vFeq/ga9 9nPELtoRQ7U0Kp0c2jT1bMy8WPUJCWjuviCzueLVieg6Quqhbw+W7rzvDGmyk3wnjDwo fm/dGSo/h0I3Gz419tmb+AbNOjA6yxgqaOFD+k8w7JDlQbrJKqLrbiKdE7odN+4ZEexy SEcDe/sbqnOjrORP8gCIZhrdj2dIxLAhSobDY10WxzpTSYN0YXpf3R3ER7aYaU3pVyEv 6koay58XkPa249QgpzGUj9dbJhKPTDk+fbHgDP317c94WRjsWjKTbL0O8T0DpxYyHZbf nldg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=74Hjlg/hhk7ywKgRPyYQg+t2V9CAh2kbQ74zXUjS5vA=; b=WuE+nos5Sy2z3P1Mdc+TazsSlr5Z4NDikGZA+yPHYgGL7b4Ru9i+TI8p4lvT/tyaSQ Cq+BhmwU+dVnKAc2SOCp4cSv+olZg9G8FqrKSUaWLPuSlae3To4KJ9hyPefPZ4lLgmd5 tuTkq4gr5eUmGWtw/70sXCC/SKv29xwdz3NFqW8YLcyhR0wFPsu4CizEM6sJn6EUTqau AFPvnxroYCe2Sy4SvrPPWnloKwmkrDEdyh+50AdhJ3fc4prv7c+vu/LejDVeFfnTnFI0 razLXaZb2Xk3IRzqcZzUP+YLQuNKGWXo7y1UnVlD1DAN7h28nM4ycQXfPDDJwzxZJwWn SNAQ==
X-Gm-Message-State: AOUpUlE/Qalg0KiFaKKdYe4mJf+qcsCmMNjP6KfckUX53/ufBz2P/jLY MhVQyAwGrZmaicH7FUo7h5Bck7OAvWgjvcBvJJE=
X-Google-Smtp-Source: AA+uWPyfCj0ay1jeHr+6Qn7roN3yb+nEA7uJzdFnUTH7ulUYRAcwKikoD3X8FJb8hGoW59eL0flBaYDvUTRGQDrBEqw=
X-Received: by 2002:a6b:410a:: with SMTP id n10-v6mr10371238ioa.0.1532032414450;  Thu, 19 Jul 2018 13:33:34 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com>
In-Reply-To: <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 19 Jul 2018 16:33:23 -0400
Message-ID: <CAGL6epJsefcO3H9=abFxMdtUeUuiTwcjpveVAhwmgS2TYfs7cg@mail.gmail.com>
To: William Denniss <wdenniss@google.com>
Cc: Michael.Jones=40microsoft.com@dmarc.ietf.org, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d90828057160170f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/bSBLPty8YS2CE7jV6Ry8kxjMugM>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:33:42 -0000

--000000000000d90828057160170f
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Yes

On Thu, Jul 19, 2018 at 4:32 PM William Denniss <wdenniss@google.com> wrote=
:

> Question: if this is adopted along with
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/, is the
> plan for this spec to be the authoritative definition, and Distributed
> OAuth to take a reference instead of redefining?
>
> On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <
> Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:
>
>> I support adoption.  The =E2=80=9Cresource=E2=80=9D request parameter th=
at it defines is
>> already widely used.
>>
>>
>>
>>                                                        -- Mike
>>
>>
>>
>> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of * Rifaat Shekh-Yuse=
f
>> *Sent:* Thursday, July 19, 2018 4:02 PM
>> *To:* oauth <oauth@ietf.org>
>> *Subject:* [OAUTH-WG] Call for adoption for "Resource Indicators for
>> OAuth 2.0"
>>
>>
>>
>> Hi all,
>>
>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
>> document
>> following the positive call for adoption at the Montreal IETF meeting.
>>
>> Here is the document:
>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>
>> Please let us know by August 2nd whether you accept / object to the
>> adoption of this document as a starting point for work in the OAuth
>> working group.
>>
>> Regards,
>> Rifaat
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>

--000000000000d90828057160170f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Yes</div><br><div class=3D"gmail_quote"><div dir=3D"ltr">O=
n Thu, Jul 19, 2018 at 4:32 PM William Denniss &lt;<a href=3D"mailto:wdenni=
ss@google.com">wdenniss@google.com</a>&gt; wrote:<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div dir=3D"ltr">Question: if this is adopted along with=C2=
=A0<a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distribute=
d/" style=3D"color:rgb(17,85,204);font-size:12.8px" target=3D"_blank">https=
://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/</a>, is the plan=
 for this spec to be the authoritative definition, and Distributed OAuth to=
 take a reference instead of redefining?<br><div class=3D"gmail_extra"><br>=
<div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <spa=
n dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.i=
etf.org" target=3D"_blank">Michael.Jones=3D40microsoft.com@dmarc.ietf.org</=
a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_7438549181286179890m_7178958459018000728m_-7844552849868633=
664WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">I support adoption.=C2=
=A0 The =E2=80=9Cresource=E2=80=9D request parameter that it defines is alr=
eady widely used.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 4:02 PM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption for &quot;Resource Indicators =
for OAuth 2.0&quot;<u></u><u></u></p><div><div class=3D"m_74385491812861798=
90m_7178958459018000728h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-=
02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
</div></div></div>
</div>

<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div></div>
</blockquote></div>

--000000000000d90828057160170f--


From nobody Thu Jul 19 13:35:00 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA637130FC1 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:34:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LcEiiVyXcRma for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:34:48 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0067.outbound.protection.outlook.com [104.47.0.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAFAB130DFA for <oauth@ietf.org>; Thu, 19 Jul 2018 13:34:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jXRJaPEzbJKltAX/sO8aDlQJQHhQae1zdpvltqkCmBM=; b=jsdUO5dVi5HVs9ybwVnIiOps3R6aHThkekhTt6l6ewpsdcEcR9QulaqDE+WaxYl1yjo/g91+iKc03oTNrmTPquqeoZkV/DCfwsPl08WVVd7sXSffS8RUyvkRStGTDN8fDxdqe5pkEEeKsyRMUgXkx+jan+OuktG8YDEHODLgDpA=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1311.eurprd08.prod.outlook.com (10.167.197.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.21; Thu, 19 Jul 2018 20:34:44 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Thu, 19 Jul 2018 20:34:44 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: William Denniss <wdenniss=40google.com@dmarc.ietf.org>, Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
CC: oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tpWfx6ee5zikCyGLNHikwcWqSW/xoAgAAA1YCAAACHUA==
Date: Thu, 19 Jul 2018 20:34:44 +0000
Message-ID: <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com>
In-Reply-To: <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1311; 7:cfuRDCaIm3vQzVD7V1xTzX09r5xiqu8m/D7tcU6mgZCgb3C4p/ZiiCU4CYWeXi0/6fXDP9ckV9+FGToLHr8O7UNCB64vmKM4Uv9oXmy6rIQEF2RLArN7dSeBib7r5xxkAC3mLLtee5+qgAqGLYYO7zH7uREXg1iCIg33ZaKbQuZJgiO5Xp3y7qdcbdH/BSHR2y0LGHfNTYdBXYf2LYSZnx+0MSZWOoqUD4HtQF5pIj8ZfwuIxR+36ZBf0Ny0P2j7
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 037eeeef-dbc2-475a-a8fc-08d5edb70fbd
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1311; 
x-ms-traffictypediagnostic: VI1PR0801MB1311:
x-microsoft-antispam-prvs: <VI1PR0801MB13110DF42847AC3C3207ED48FA520@VI1PR0801MB1311.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(120809045254105)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1311; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1311; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(39860400002)(366004)(376002)(136003)(346002)(53754006)(189003)(199004)(40434004)(966005)(33656002)(97736004)(2900100001)(790700001)(66066001)(236005)(6306002)(106356001)(105586002)(14454004)(3846002)(6116002)(9686003)(72206003)(6436002)(229853002)(54896002)(55016002)(478600001)(606006)(26005)(4326008)(86362001)(2906002)(76176011)(8676002)(7736002)(9326002)(316002)(53546011)(186003)(74316002)(11346002)(8936002)(81166006)(446003)(110136005)(7696005)(53936002)(5660300001)(68736007)(476003)(6506007)(81156014)(14444005)(256004)(486006)(5250100002)(99286004)(5024004)(25786009)(6246003)(102836004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1311; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: zIyFHt64RqTVgu68dNsPtHeV5/I+If3q7Ox7U0aAb6KK9sXeg/z5++/oHHTZwOYozZE4bdtE91QFqCRUn9WDYMcJL/asgGhQQ7b+lThwKK4Mz4TuMUipRqVcnb0XqeMcM815jXb0PQ1MgMDyKFueucu5AIcuInes0mxMygCzbvYkmXGFucxszq5v0dCGHlbiH+V69XXfhPw+50blJA6MAzPlvmmPrQOvxwl/l9/u8FBTZoXTzy5TuFj1v8OWes9y2/ixeajkag9sE1h1GhkUBiRTIqOj+4D7kkgnWyIB4xl19OIStMXSah3lSNK62997ZhWoudSn44uJAPKdkDfDmzih5vlaDzfuq57NIhHpsl0=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 037eeeef-dbc2-475a-a8fc-08d5edb70fbd
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 20:34:44.0518 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1311
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/leKAmVVROhMp5cyR1j_EQWDR3NY>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:34:57 -0000

--_000_VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520VI1PR0801MB2112_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520VI1PR0801MB2112_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520VI1PR0801MB2112_--


From nobody Thu Jul 19 13:40:07 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB324131055 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:40:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qjdt46uR04qS for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:40:01 -0700 (PDT)
Received: from mail-vk0-x243.google.com (mail-vk0-x243.google.com [IPv6:2607:f8b0:400c:c05::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BE3C130FA0 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:39:58 -0700 (PDT)
Received: by mail-vk0-x243.google.com with SMTP id l143-v6so5070939vke.1 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:39:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Svj84kDklaZ09aN3QY9Ftsd12danvhfH+olpMS7uNK4=; b=CsBJF6I2OGV8MM8AYwbp7/FA1WsnkdGwhMMzlS/TSHhUTKIogCZ/DWRgqlBJyU/RTZ T62RTDObgtR+ilXYZzrBK0u+eLJpWhYoS3Rlkk3FgtAU7Rz/Hs0+c9+kWAu6e0/cMeF5 OLlDYwBbl9fue0vSnH8+cTd+8G29dFJrZc5A4i88XqBq3EC5ab9bbMeZFsAWiGGi3lps 8Ks/rbLrl9pdyxOTY2rhy/obk43JeXMaOo1jh2MgeeLbxScT4rfcnRZEpbxqtR6vQpiE yjiWw7NomX7n/2fM/dNr0Gi8hAQHUAWhpOKkvypYyxmnM5rvbjxUMH3HY+Ub5In2KNHQ v1cg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Svj84kDklaZ09aN3QY9Ftsd12danvhfH+olpMS7uNK4=; b=dC9quKOQuFTRHr6sqbPOQVdEBZD+OX1W9aofGQhyG1o7a7HmQa1bL+bNxu/5y01y8o cAfDBZLDZa5jXmvPGnGGVfHVam4gXLJ0nwsmyEPCq5LNREEWlhz0GI7B3dALY35xse1e SuqBDKy5ExoGZMUKj7+KycaiDttP0kXQLvulhlfYZbms0QBkOXZLeo80svEv0XfShs/h Maf8HXaslDaNsEpOvIsH7WsVAzKvQoyGsbXEugqsqQ2KlokcCc48kx8rhLG1e43Juqqw qz5x2L6DkvXpdJ6wdXF5XP+O6fxgQEMgU5qLe1gTBHSgOaLvbcfBVOic8yXNg1fRQCfn l0vA==
X-Gm-Message-State: AOUpUlEsAuRFnAB4V7mKRYMiql+Aa3WV4+mP8xs9rtVA8ozDkgDH0rVi FLnLcnKcPf9Ni1OXqfQ+MpE1AZINMhgAeBFSdPyyTJj1
X-Google-Smtp-Source: AAOMgpejyjP7AFbMLnEXyuTSfauqBHCVtnbIcMyEohpDDbfgZUvOJuelUJMiEJXKVqC0jZyoG3EP0frfqVF+OCi7Jgo=
X-Received: by 2002:a1f:5981:: with SMTP id n123-v6mr7254958vkb.43.1532032796690;  Thu, 19 Jul 2018 13:39:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 13:39:36 -0700 (PDT)
In-Reply-To: <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com> <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
From: William Denniss <wdenniss@google.com>
Date: Thu, 19 Jul 2018 13:39:36 -0700
Message-ID: <CAAP42hAfsW2i-D64WzfCCZ8qf=+kq1ao-UHubrvVUT=HVuY0AQ@mail.gmail.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Mike Jones <Michael.Jones@microsoft.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a23ea90571602ecc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/3NzwEcAcitL411JOlHG5GW5_Ing>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:40:05 -0000

--000000000000a23ea90571602ecc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks! I assume then that there are use-cases for this that are outside
the Distributed OAuth use-case? Did we document them?  I'm supportive (of
both drafts), but think we should get the rationale on the record since the
option to incorporate this spec in Distributed OAuth was raised in the
meeting.


On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tschofenig <
Hannes.Tschofenig@arm.com> wrote:

> Hi William,
>
>
>
> that was the idea.
>
>
>
> Ciao
>
> Hannes
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org] *On Behalf Of *William
> Denniss
> *Sent:* 19 July 2018 16:32
> *To:* Mike Jones
> *Cc:* oauth
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Question: if this is adopted along with https://datatracker.ietf.
> org/doc/draft-hardt-oauth-distributed/, is the plan for this spec to be
> the authoritative definition, and Distributed OAuth to take a reference
> instead of redefining?
>
>
>
> On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <Michael.Jones=3D40microsoft.
> com@dmarc.ietf.org> wrote:
>
> I support adoption.  The =E2=80=9Cresource=E2=80=9D request parameter tha=
t it defines is
> already widely used.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of *Rifaat Shekh-Yusef
> *Sent:* Thursday, July 19, 2018 4:02 PM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy th=
e
> information in any medium. Thank you.
>

--000000000000a23ea90571602ecc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks! I assume then that there are use-cases for this th=
at are outside the Distributed OAuth use-case? Did we document them?=C2=A0 =
I&#39;m supportive (of both drafts), but think we should get the rationale =
on the record since the option to incorporate this spec in Distributed OAut=
h was raised in the meeting.<div><br></div></div><div class=3D"gmail_extra"=
><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tsc=
hofenig <span dir=3D"ltr">&lt;<a href=3D"mailto:Hannes.Tschofenig@arm.com" =
target=3D"_blank">Hannes.Tschofenig@arm.com</a>&gt;</span> wrote:<br><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex">





<div lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-907124991211456452WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Hi William,
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">that was the idea.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><a name=3D"m_-907124991211456452__MailEndCompose"><s=
pan style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></span></a></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ciao<u></u><u></u></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Hannes<u></u><u></u></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=C2=A0<u></u></spa=
n></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:10.0pt;fo=
nt-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&qu=
ot;sans-serif&quot;"> OAuth [mailto:<a href=3D"mailto:oauth-bounces@ietf.or=
g" target=3D"_blank">oauth-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>William Denniss<br>
<b>Sent:</b> 19 July 2018 16:32<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></span></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Question: if this is adopted along with=C2=A0<a href=
=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" target=
=3D"_blank"><span style=3D"font-size:9.5pt;color:#1155cc">https://datatrack=
er.ietf.<wbr>org/doc/draft-hardt-oauth-<wbr>distributed/</span></a>,
 is the plan for this spec to be the authoritative definition, and Distribu=
ted OAuth to take a reference instead of redefining?<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones &lt;<a h=
ref=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.org" target=3D"_bl=
ank">Michael.Jones=3D40microsoft.<wbr>com@dmarc.ietf.org</a>&gt; wrote:<u><=
/u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#002060">I suppo=
rt adoption.=C2=A0 The =E2=80=9Cresource=E2=80=9D request parameter that it=
 defines is already widely used.</span><span lang=3D"EN-US"><u></u><u></u><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#002060">=C2=A0<=
/span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#002060">=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike</span><span lang=3D"EN-US"><u></u><u></u><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#002060">=C2=A0<=
/span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US">From:</span></b><span lang=
=3D"EN-US"> OAuth &lt;<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_=
blank">oauth-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 4:02 PM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption for &quot;Resource Indicators =
for OAuth 2.0&quot;<u></u><u></u></span></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
<a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource-indica=
tors-02" target=3D"_blank"><span style=3D"color:#1155cc">https://tools.ietf=
.org/html/<wbr>draft-campbell-oauth-resource-<wbr>indicators-02</span></a><=
br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat <u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div></div></div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</div>

</blockquote></div><br></div>

--000000000000a23ea90571602ecc--


From nobody Thu Jul 19 13:53:17 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EFDE130E30 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:53:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YJcfHKfnO6Js for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:53:08 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640104.outbound.protection.outlook.com [40.107.64.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD3EE130EF4 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:53:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SJ7/dEeOIYHlnd1YtLElrSYHxGojlAIRTJ6WZq8fbZo=; b=RtJwkqg1i7jQGjkankbyCyHyH+wRew5by2eR9OegaJAygKQAO8JAxIFJ3+dkVKN9fvGg3D8+dF/CRtEBov+0V3FcDYE53b5Ww6u45WRLCOiIzgmJyjtiSblbaBtHRd6xIIndJUN+b0xnMLA6IwhLze6sRBiqnoc0HIFlYCXo/JM=
Received: from DM5PR00MB0296.namprd00.prod.outlook.com (52.132.128.37) by DM5PR00MB0438.namprd00.prod.outlook.com (52.132.129.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.1016.0; Thu, 19 Jul 2018 20:53:05 +0000
Received: from DM5PR00MB0296.namprd00.prod.outlook.com ([fe80::ccd4:2ea:171a:e326]) by DM5PR00MB0296.namprd00.prod.outlook.com ([fe80::ccd4:2ea:171a:e326%8]) with mapi id 15.20.1017.000; Thu, 19 Jul 2018 20:53:05 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: William Denniss <wdenniss@google.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>
CC: oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tpAEJtgz4Ml0eD0vJ2JOwxQKSW/s9QgAABIICAAAC0AIAAAVwAgAADBoA=
Date: Thu, 19 Jul 2018 20:53:05 +0000
Message-ID: <DM5PR00MB02967D18645764A7E598B4EFF5520@DM5PR00MB0296.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com> <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com> <CAAP42hAfsW2i-D64WzfCCZ8qf=+kq1ao-UHubrvVUT=HVuY0AQ@mail.gmail.com>
In-Reply-To: <CAAP42hAfsW2i-D64WzfCCZ8qf=+kq1ao-UHubrvVUT=HVuY0AQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:67c:1232:144:a03e:93f:7764:5cc7]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR00MB0438; 6:ZeHFcapLe6sw7mzoK/d7FkhH+aCuq91HmaXi4AjR/RsBamHBVGXbL8izzYsBmUi6C3j0/0Z/RMLVh2RVGR5cFZAf8aGIRHAX9x3uknszoH5p59fmqrvHxqEaLIToszzZr9u2xUZHbSnouUPY8bQIknQ6L8E3CeD56qXFcpIr60gM+kwNXoa9eW3dDD+kDDMIEpA6MHAANCXOnbSvV6TeKljDDwCs1kX1JL8MIqEewett/EdmNsQz3C4MSH26cCQCn+HZGZzfAmVH679TB5jzgvJOGHYutLrOBFRmqW/ENcb6s0HVgPoKxJE8t6DDJeJrxNUvrZVn1zP/q7s2hV3fXpZlAQkTSSL8B9UMM//A26T/+h8Feoa2D0uW5HbjVDeWGzf63jJZDMKK4o6UMHQJ32xLnnCtjRo1u96O25Ukpq+nQqf4EN19BR9XhN1XK9JVBf/IxVPZ63rrXzHAHs2foA==; 5:JpdwytQfemf1caCDkEQZ1zLBftb/JymD3DawC5mHKOMJfexTAlL5YfnYpuv4hOWyyVYqtjiu3ClIwnZoTZYe/gSBgzCdEldy/p1yh24CYt7CsUATbT47hE78VE5KTw/rA/TYV8S4Q1Yen13kq/A8Eh85pJWNeWhJz0xyPkUYyoU=; 7:+captnx9NtS5oA0gAf89iC3ok3nOonoEwFuq7ul1jxpYDKmq4ldNoVtvaY36kOHahKRL+6fBHGxkjhKaEzdDB8YTJWsbTl5Ts0cOS9Qzx5b0PUDc0RmxItkl94eATPRDXkAwUIk+KgjhxgGvNIcAapBp/UPYGhAdRadD6IxPHwcLiNdzXjVHPOHNZKuKBdYQAMfbaxWmMhP9yyRkDbrm8iF2sFhfAANOS4i7PGu8nS3KK3vUDdKdvimOmWyysgwD
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 7b86224c-7efc-463a-f9ad-08d5edb9a05c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(5600067)(711020)(4618075)(2017052603328)(7193020); SRVR:DM5PR00MB0438; 
x-ms-traffictypediagnostic: DM5PR00MB0438:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-microsoft-antispam-prvs: <DM5PR00MB0438208C2750A9F68DD5AEA8F5520@DM5PR00MB0438.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(180628864354917)(89211679590171)(120809045254105)(223705240517415)(211936372134217)(153496737603132)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3002001)(93006095)(93001095)(3231311)(944501410)(52105095)(2018427008)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(20161123560045)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:DM5PR00MB0438; BCL:0; PCL:0; RULEID:; SRVR:DM5PR00MB0438; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(136003)(366004)(346002)(376002)(40434004)(189003)(199004)(53754006)(68736007)(22452003)(93886005)(110136005)(606006)(8936002)(81166006)(81156014)(316002)(6246003)(790700001)(6116002)(8676002)(19609705001)(53936002)(7736002)(99286004)(10090500001)(229853002)(54896002)(55016002)(6436002)(8990500004)(6306002)(74316002)(236005)(97736004)(2906002)(9686003)(86362001)(105586002)(186003)(53546011)(76176011)(486006)(106356001)(6506007)(86612001)(476003)(11346002)(33656002)(446003)(10290500003)(4326008)(966005)(25786009)(46003)(478600001)(14454004)(72206003)(5660300001)(14444005)(5024004)(256004)(2900100001)(7696005)(102836004)(5250100002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR00MB0438; H:DM5PR00MB0296.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 1viMcbXRN8PFdR5zXqJkmfkRJA/P9W/amSolQuxm1++CWzEs0gpJJrXID8fiqrkWiWJTXe2vBQaBfKq1mtx41kXeFkNR+v7NMN6Wn8Pa5MCoeBeV/1NrbAU1bPfVmFyKxIszrud0fJOgRLUI19omSniKBBbNJVxnlNdamjW7Nh3RP3zUV+tca0pT0Ta0wqu8lARdy4rIzbupoJm/DibSnDtI1RwdDBT4KH8SWKpk6shuaN03c+GAGkbcAbrVib2hE7saeHb7kJgp8txzjhMvhUtDnMHM3dGQ8GyOj1Fn4B0JwrX6AWQ+GKU6WgFPD4W/4uOkhGpZbLJwa7NKazvE1kUb3ohkBtRGPJfcWtvJ9Z8=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR00MB02967D18645764A7E598B4EFF5520DM5PR00MB0296namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b86224c-7efc-463a-f9ad-08d5edb9a05c
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 20:53:05.6452 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR00MB0438
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Zk6MKrrCzX3V0unbz1MSXGm1b_g>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:53:12 -0000

--_000_DM5PR00MB02967D18645764A7E598B4EFF5520DM5PR00MB0296namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR00MB02967D18645764A7E598B4EFF5520DM5PR00MB0296namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_DM5PR00MB02967D18645764A7E598B4EFF5520DM5PR00MB0296namp_--


From nobody Thu Jul 19 13:54:40 2018
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D43E130FC2 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:54:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3SH7FwzVtDCy for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 13:54:27 -0700 (PDT)
Received: from mail-it0-x22a.google.com (mail-it0-x22a.google.com [IPv6:2607:f8b0:4001:c0b::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78513130F43 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:54:27 -0700 (PDT)
Received: by mail-it0-x22a.google.com with SMTP id g141-v6so9447750ita.4 for <oauth@ietf.org>; Thu, 19 Jul 2018 13:54:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=message-id:mime-version:to:from:subject:date:importance:in-reply-to :references; bh=WQH5iosvx73+6oYkOMCi1h7AYl7qycPmH77AGYulX2o=; b=DvwywZOhuBDOgYXVDdgVLRjnfzor1ow1j6miyYjMU2EaevKRiNjD7hV68fTZ8c3S0/ 2eEHm7rAZnmihiuJiGJ6RjPPPtQyQ1up4MBrUyfCs0TCY/syFHQMOBuaO1VvW89TQqE+ hlNaayQz91oBkJPIA+IDSvnE/WW9o25tjy5NmX7A5IWb9/ma1lLsbQtTL/TWprd5tEg7 Xub4c1Jh8W56jdMtNlJEKpjQHMcdx4WwAJm/dTDbtxJPuyCnkDU15tN5yZS4FLQOj5jl ns3DOOQp4E1+UQDhzenHHcvbBsjF4uYVJPEPRpmf0Yv6ND+JBWnlCE2vgMIRiyTenstD BoAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:mime-version:to:from:subject:date :importance:in-reply-to:references; bh=WQH5iosvx73+6oYkOMCi1h7AYl7qycPmH77AGYulX2o=; b=XnwhOhoU/3856NNOiKxaBW4y7NF8y3kMWLL775LzsjMaCnYy/2hiIhWbDxM+11b9Di N3sjf/fwQy9CLtiSTwSRo378fl5mvSVvO/zk4vNNyMmQq6CimgpgvY+25k/K+OfFjIk0 HNfSaYvfCFZBHVwMuxe7W3/9QLhCPFXtdGpskp156zFnhoc+jeGEv0vFTgQ4Dz2jX5jg iDwQ0Gqh+SLvt3SLlIBukPYoMorB+9zD98DZjStkEPpOACObfXXGpv2ONCpogr4k+viD diyJqLN2dPnPZb+z6P1e7NpTDhR5RFPvKQOMTlqjo4EzJS6YU7hNMV0SnN6hClPxPpgL CA7g==
X-Gm-Message-State: AOUpUlHh1fB7LDM8wB0EobHhoHfbFpd+scFLoLqQe4zUdBYU+gkr9khY Z+pNWFrT7zCkRdoG26QLrpqrLA==
X-Google-Smtp-Source: AAOMgpfR2yRG3aVJUkYAvvMylG5XmI5K05/IB9SUrS4jPfZk+hicoo4G8xhfmX2df+xEVOPCZmfZUg==
X-Received: by 2002:a24:9b82:: with SMTP id o124-v6mr6639009itd.56.1532033666369;  Thu, 19 Jul 2018 13:54:26 -0700 (PDT)
Received: from ?IPv6:::ffff:31.133.157.105? (dhcp-9d69.meeting.ietf.org. [31.133.157.105]) by smtp.gmail.com with ESMTPSA id 80-v6sm247958itl.35.2018.07.19.13.54.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 19 Jul 2018 13:54:25 -0700 (PDT)
Message-ID: <5b50fa81.1c69fb81.3575.17b3@mx.google.com>
MIME-Version: 1.0
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
From: John Bradley <ve7jtb@ve7jtb.com>
Date: Thu, 19 Jul 2018 16:54:26 -0400
Importance: normal
X-Priority: 3
In-Reply-To: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="_CACCADB7-4C54-4AB1-9729-7014CF56B536_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/IUaHEkY8hv0wvTPGnEUNaC_47-0>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 20:54:36 -0000

--_CACCADB7-4C54-4AB1-9729-7014CF56B536_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"


I accept the adoption of this document.

Sent from Mail for Windows 10

From: Rifaat Shekh-Yusef
Sent: Thursday, July 19, 2018 4:02 PM
To: oauth
Subject: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.=
0"

Hi all,

This is the call for adoption of the 'Resource Indicators for OAuth 2.0' do=
cument
following the positive call for adoption at the Montreal IETF meeting.

Here is the document:
https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02

Please let us know by August 2nd whether you accept / object to the
adoption of this document as a starting point for work in the OAuth
working group.

Regards,
Rifaat=20


--_CACCADB7-4C54-4AB1-9729-7014CF56B536_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta ht=
tp-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta name=
=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style></head><body lang=3DEN-US link=3Dblue vlink=3D"#954F72"><div cla=
ss=3DWordSection1><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoN=
ormal>I accept the adoption of this document.</p><p class=3DMsoNormal><o:p>=
&nbsp;</o:p></p><p class=3DMsoNormal>Sent from <a href=3D"https://go.micros=
oft.com/fwlink/?LinkId=3D550986">Mail</a> for Windows 10</p><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p><div style=3D'mso-element:para-border-div;border=
:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3D=
MsoNormal style=3D'border:none;padding:0in'><b>From: </b><a href=3D"mailto:=
rifaat.ietf@gmail.com">Rifaat Shekh-Yusef</a><br><b>Sent: </b>Thursday, Jul=
y 19, 2018 4:02 PM<br><b>To: </b><a href=3D"mailto:oauth@ietf.org">oauth</a=
><br><b>Subject: </b>[OAUTH-WG] Call for adoption for &quot;Resource Indica=
tors for OAuth 2.0&quot;</p></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p=
><p class=3DMsoNormal><span style=3D'font-size:12.0pt'>Hi all,<br><br>This =
is the call for adoption of the 'Resource Indicators for OAuth 2.0' documen=
t<br>following the positive call for adoption at the Montreal IETF meeting.=
<br><br>Here is the document:<br></span><a href=3D"https://tools.ietf.org/h=
tml/draft-campbell-oauth-resource-indicators-02" target=3D"_blank"><span st=
yle=3D'font-size:12.0pt;color:#1155CC'>https://tools.ietf.org/html/draft-ca=
mpbell-oauth-resource-indicators-02</span></a><span style=3D'font-size:12.0=
pt'><br><br>Please let us know by August 2nd whether you accept / object to=
 the<br>adoption of this document as a starting point for work in the OAuth=
<br>working group.<br><br>Regards,<br>Rifaat</span> </p><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p></div></body></html>=

--_CACCADB7-4C54-4AB1-9729-7014CF56B536_--


From nobody Thu Jul 19 14:10:44 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91DC0130F67 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:10:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NK3yYRnvwVw2 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:10:40 -0700 (PDT)
Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com [IPv6:2607:f8b0:4864:20::529]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B320130F59 for <oauth@ietf.org>; Thu, 19 Jul 2018 14:10:40 -0700 (PDT)
Received: by mail-pg1-x529.google.com with SMTP id x5-v6so4836897pgp.7 for <oauth@ietf.org>; Thu, 19 Jul 2018 14:10:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=vVfmIUU59sKvRd/z0pFs2llqqwS+5eQK4X7qAfiE9kQ=; b=uLF7+fX04TmjZAGrs1nYenErZJajdTlgYXQZIyRKCqRJ3Qd7JS/H1/oiTKHsevDM4w 9tcy/d8ija38d0nbLtDwrkm0Mt2l3sNDqzHxuzIrEoM9BlK5oNOROy2cPXC3izf5AJ37 5q+i4f9gzb87lEEuBwTaQXQ+CqcsdbPinpMP3+jecuL3eNB0IKd/m9SpRZ+H8N9D3OP7 ux/l3AcNvIZb0VF57Zb9dLSAwV/ja+VkvC6AdVmyM81MSBz6avMZP8+/K7CJ3NOBZ0sm woh8qHRpAJ/dxhX4Gan1OAU9PVxihK79YW1EQONNwmrRst464E6bwKrjOzGMgaPwxI+h s7Cw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=vVfmIUU59sKvRd/z0pFs2llqqwS+5eQK4X7qAfiE9kQ=; b=Ldhad37a8Y5NR83m9T3bpBVhE6Ths1ppHdgOOaDMygCuLXjhPWXbXbzm4kOW7C0SiI o4oTS47LWnsO5th/rbg2vyK16jx00FamHYLGYq6cvdgsnwlScaRNUQex9J1UaUOd5pUX pwO211fWz+tTf/M8gEbKkhdUz/ZoI9pwjGE8S0wM60if/4NZ0Cyn9Hk8Lrk3lmZyJ/uH KJb6/Z78ypD3Mqc7AnXnDeIBUZmomh8Kw5AFOPvjKaRlKJO28NUagSOiBzaVlJYQOUla NupnjqmYz/GomG/KL2Vavb56YxITHcmLU4iAWn4s96dTjRTeb/L18j2Ez+o+fKvqBNbE ajOg==
X-Gm-Message-State: AOUpUlHVwvF1hEw2jf2pmQq0gHED+m10nHnTIFWFKOzZ07CXAcFeGs6V IKqRch8+Bm50OvH3b9pW4GRz4U8UzzcJYzNpPwQ=
X-Google-Smtp-Source: AAOMgpdspqtocmULx/T2IJ/yMxY6sm4tudkyDKFQbRfAUtVBE/HE2l58fdfPelyNnhRJL2gMC5YEvu++8LYNqDyTGjM=
X-Received: by 2002:a62:f50b:: with SMTP id n11-v6mr11083312pfh.120.1532034639742;  Thu, 19 Jul 2018 14:10:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Thu, 19 Jul 2018 14:10:19 -0700 (PDT)
In-Reply-To: <5b50fa81.1c69fb81.3575.17b3@mx.google.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <5b50fa81.1c69fb81.3575.17b3@mx.google.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 19 Jul 2018 17:10:19 -0400
Message-ID: <CAD9ie-vN=h8f1Wc6kmcmp_Du2ZdTgy0w_kyi8PKARZUAh8X+Pw@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Cc: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007c4d3f0571609ce1"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/xhDtxPpuYAKkHNOs_LQ4Nw4tFyM>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 21:10:43 -0000

--0000000000007c4d3f0571609ce1
Content-Type: text/plain; charset="UTF-8"

I support adoption of this document.

On Thu, Jul 19, 2018 at 4:54 PM, John Bradley <ve7jtb@ve7jtb.com> wrote:

>
>
> I accept the adoption of this document.
>
>
>
> Sent from Mail <https://go.microsoft.com/fwlink/?LinkId=550986> for
> Windows 10
>
>
>
> *From: *Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Sent: *Thursday, July 19, 2018 4:02 PM
> *To: *oauth <oauth@ietf.org>
> *Subject: *[OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--0000000000007c4d3f0571609ce1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I support adoption of this document.</div><div class=3D"gm=
ail_extra"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 4:54 PM, =
John Bradley <span dir=3D"ltr">&lt;<a href=3D"mailto:ve7jtb@ve7jtb.com" tar=
get=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"#954F72"><div clas=
s=3D"m_5038294042690182344WordSection1"><p class=3D"MsoNormal"><u></u>=C2=
=A0<u></u></p><p class=3D"MsoNormal">I accept the adoption of this document=
.</p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal">=
Sent from <a href=3D"https://go.microsoft.com/fwlink/?LinkId=3D550986" targ=
et=3D"_blank">Mail</a> for Windows 10</p><p class=3D"MsoNormal"><u></u>=C2=
=A0<u></u></p><div style=3D"border:none;border-top:solid #e1e1e1 1.0pt;padd=
ing:3.0pt 0in 0in 0in"><p class=3D"MsoNormal" style=3D"border:none;padding:=
0in"><b>From: </b><a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank=
">Rifaat Shekh-Yusef</a><span class=3D""><br><b>Sent: </b>Thursday, July 19=
, 2018 4:02 PM<br><b>To: </b><a href=3D"mailto:oauth@ietf.org" target=3D"_b=
lank">oauth</a><br></span><b>Subject: </b>[OAUTH-WG] Call for adoption for =
&quot;Resource Indicators for OAuth 2.0&quot;</p></div><div><div class=3D"h=
5"><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNormal"><s=
pan style=3D"font-size:12.0pt">Hi all,<br><br>This is the call for adoption=
 of the &#39;Resource Indicators for OAuth 2.0&#39; document<br>following t=
he positive call for adoption at the Montreal IETF meeting.<br><br>Here is =
the document:<br></span><a href=3D"https://tools.ietf.org/html/draft-campbe=
ll-oauth-resource-indicators-02" target=3D"_blank"><span style=3D"font-size=
:12.0pt;color:#1155cc">https://tools.ietf.org/html/<wbr>draft-campbell-oaut=
h-resource-<wbr>indicators-02</span></a><span style=3D"font-size:12.0pt"><b=
r><br>Please let us know by August 2nd whether you accept / object to the<b=
r>adoption of this document as a starting point for work in the OAuth<br>wo=
rking group.<br><br>Regards,<br>Rifaat</span> </p><p class=3D"MsoNormal"><u=
></u>=C2=A0<u></u></p></div></div></div></div><br>_________________________=
_____<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--0000000000007c4d3f0571609ce1--


From nobody Thu Jul 19 14:11:42 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEFA5130F7B for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:11:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3WEB9W7UJIIh for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:11:37 -0700 (PDT)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76443130F59 for <oauth@ietf.org>; Thu, 19 Jul 2018 14:11:37 -0700 (PDT)
Received: by mail-pg1-x52e.google.com with SMTP id r5-v6so4849657pgv.0 for <oauth@ietf.org>; Thu, 19 Jul 2018 14:11:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=iXpX0s4T9gJsVZH6rozIfpurE4rk1+BoSO2UW+e9bKc=; b=bVhk71MUvmxV5uMdUBqk6yvVklEgmTB5ewiridpjmdWUvgU5br2Ms1aTBxIxCG+62l LtW059lJFzeSh8n6PtpcF6ZZpLtg8VelTN8WyHeGK5J56GP9Y6gLQezvTsw5jrDMiwct KJGWWSHyrCdZdUudjT1QZl8WR735sSfeocTN4ZDDcCqucrb7J8oNiUbrwkTgRHBVp5EE KWvuLa9PJw6dVw5dGh46i1LFt9KPR8Li9Ju0fwOocu69AkYFV/mpK0RO7ckK/qCFR6Q1 x/nC2OBOQImi0134xwRPCJQH8t9GIwBFbX8fJagowHhnIKnh6xh837yLLUvt5bxcTCGL 1kVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=iXpX0s4T9gJsVZH6rozIfpurE4rk1+BoSO2UW+e9bKc=; b=puZ0M/2L6FeViTf55gzw8kMDajkUKcqHFHV7WqLN/gTPxi4VFztMvuSztZ/AHyzwV8 LMFGNi0fg70hOrsMhudBXFFPctUzuUJVoxStTnc7O0iGlDzVL9zzQblnbqQHVgV1J98o 49dEbFkJ9e4SOxrXfQ5DTB7gvkuxDVk9TRCAm8UKdiPYLhfe7ClAAKyeuELKXQDzbSYS GRM1BdgYFMsX2wdhSgR+3nVnpbK8Tunn5k8JiuornpVXj7AIFlvxN6qxnxHki701nNi4 nIYQ8wTU+fsjOAgTiPOX38R3yFSc2Q6+moZ1YRcHkUWRdtz2ZZGERXl92kXZGWfdM0wJ p0Gg==
X-Gm-Message-State: AOUpUlEJxnrd1wN/LQ0US9CdDuoazUO2yaCRJt2s4wQNgLsxW6z64DhI 222taB5i92ywYzTYxLElBp0hGLK0h6/1CWEg1Gc=
X-Google-Smtp-Source: AAOMgpfxnAjDMkAOBYy81W4x22iqixRLqs2iKV4VrZ0CAGJNcnEdFLWi6yU1Y4eyjpbWkL7tdPd02pkFdPHOd56G+NU=
X-Received: by 2002:a63:6243:: with SMTP id w64-v6mr11471748pgb.179.1532034696930;  Thu, 19 Jul 2018 14:11:36 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Thu, 19 Jul 2018 14:11:16 -0700 (PDT)
In-Reply-To: <DM5PR00MB02967D18645764A7E598B4EFF5520@DM5PR00MB0296.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com> <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com> <CAAP42hAfsW2i-D64WzfCCZ8qf=+kq1ao-UHubrvVUT=HVuY0AQ@mail.gmail.com> <DM5PR00MB02967D18645764A7E598B4EFF5520@DM5PR00MB0296.namprd00.prod.outlook.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 19 Jul 2018 17:11:16 -0400
Message-ID: <CAD9ie-v4=r4XWVbvGryh24iQ_uXbHO8cd0=L2yc4XtbecmOvpw@mail.gmail.com>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
Cc: William Denniss <wdenniss@google.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e4eb480571609f19"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/TtH2CCeywfN0otVO_9hXYfE-gZQ>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 21:11:41 -0000

--000000000000e4eb480571609f19
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

William: there was discussion in the meeting about the PoP document using
"resource" rather than "aud"

On Thu, Jul 19, 2018 at 4:53 PM, Mike Jones <
Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:

> Microsoft=E2=80=99s Azure AD OAuth server has used the resource=3D parame=
ter since
> at least 2012 to indicate what resource the requested access token is to =
be
> for.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* William Denniss <wdenniss@google.com>
> *Sent:* Thursday, July 19, 2018 4:40 PM
> *To:* Hannes Tschofenig <Hannes.Tschofenig@arm.com>
> *Cc:* Mike Jones <Michael.Jones@microsoft.com>; oauth <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Thanks! I assume then that there are use-cases for this that are outside
> the Distributed OAuth use-case? Did we document them?  I'm supportive (of
> both drafts), but think we should get the rationale on the record since t=
he
> option to incorporate this spec in Distributed OAuth was raised in the
> meeting.
>
>
>
>
>
> On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tschofenig <
> Hannes.Tschofenig@arm.com> wrote:
>
> Hi William,
>
>
>
> that was the idea.
>
>
>
> Ciao
>
> Hannes
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org] *On Behalf Of *William
> Denniss
> *Sent:* 19 July 2018 16:32
> *To:* Mike Jones
> *Cc:* oauth
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Question: if this is adopted along with https://datatracker.ietf.
> org/doc/draft-hardt-oauth-distributed/, is the plan for this spec to be
> the authoritative definition, and Distributed OAuth to take a reference
> instead of redefining?
>
>
>
> On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <Michael.Jones=3D40microsoft.
> com@dmarc.ietf.org> wrote:
>
> I support adoption.  The =E2=80=9Cresource=E2=80=9D request parameter tha=
t it defines is
> already widely used.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of *Rifaat Shekh-Yusef
> *Sent:* Thursday, July 19, 2018 4:02 PM
> *To:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy th=
e
> information in any medium. Thank you.
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--000000000000e4eb480571609f19
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">William: there was discussion in the meeting about the PoP=
 document using &quot;resource&quot; rather than &quot;aud&quot;</div><div =
class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 a=
t 4:53 PM, Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=
=3D40microsoft.com@dmarc.ietf.org" target=3D"_blank">Michael.Jones=3D40micr=
osoft.com@dmarc.ietf.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_4022479633966232699WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">Microsoft=E2=80=99s Az=
ure AD OAuth server has used the resource=3D parameter since at least 2012 =
to indicate what resource the requested access token is to be for.<u></u><u=
></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> William Denniss &lt;<a href=3D"mailto:w=
denniss@google.com" target=3D"_blank">wdenniss@google.com</a>&gt; <br>
<b>Sent:</b> Thursday, July 19, 2018 4:40 PM<br>
<b>To:</b> Hannes Tschofenig &lt;<a href=3D"mailto:Hannes.Tschofenig@arm.co=
m" target=3D"_blank">Hannes.Tschofenig@arm.com</a>&gt;<br>
<b>Cc:</b> Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com" ta=
rget=3D"_blank">Michael.Jones@microsoft.com</a>&gt;; oauth &lt;<a href=3D"m=
ailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt;<span class=
=3D""><br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></span></p><span class=3D"">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Thanks! I assume then that there are use-cases for t=
his that are outside the Distributed OAuth use-case? Did we document them?=
=C2=A0 I&#39;m supportive (of both drafts), but think we should get the rat=
ionale on the record since the option to incorporate
 this spec in Distributed OAuth was raised in the meeting.<u></u><u></u></p=
>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</span><div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div><span class=3D"">
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tschofenig &=
lt;<a href=3D"mailto:Hannes.Tschofenig@arm.com" target=3D"_blank">Hannes.Ts=
chofenig@arm.com</a>&gt; wrote:<u></u><u></u></p>
</span><blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;pad=
ding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div><span class=3D"">
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Hi Will=
iam,
</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">=C2=A0<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">that wa=
s the idea.
</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><a name=3D"m_4022479633966232699_m_-9071249912114564=
52__MailEndCompose"><span lang=3D"EN-GB" style=3D"color:#1f497d">=C2=A0</sp=
an></a><span></span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Ciao</s=
pan><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Hannes<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">=C2=A0<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> OAuth [mailto:<a href=3D"mailto:=
oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>William Denniss<br>
<b>Sent:</b> 19 July 2018 16:32<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;</span><span lang=3D"EN-GB"><u></u><u></u></span></p=
>
</span><div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
<div><span class=3D"">
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Question: if this is adopted al=
ong with=C2=A0<a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth=
-distributed/" target=3D"_blank"><span style=3D"font-size:9.5pt;color:#1155=
cc">https://datatracker.ietf.<wbr>org/doc/draft-hardt-oauth-<wbr>distribute=
d/</span></a>,
 is the plan for this spec to be the authoritative definition, and Distribu=
ted OAuth to take a reference instead of redefining?<u></u><u></u></span></=
p>
</span><div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
<div><span class=3D"">
<p class=3D"MsoNormal"><span lang=3D"EN-GB">On Thu, Jul 19, 2018 at 1:29 PM=
, Mike Jones &lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ie=
tf.org" target=3D"_blank">Michael.Jones=3D40microsoft.<wbr>com@dmarc.ietf.o=
rg</a>&gt;
 wrote:<u></u><u></u></span></p>
</span><div>
<div><span class=3D"">
<p class=3D"MsoNormal"><span style=3D"color:#002060">I support adoption.=C2=
=A0 The =E2=80=9Cresource=E2=80=9D request parameter that it defines is alr=
eady widely used.</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0</span><span lan=
g=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0</span><span lan=
g=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 4:02 PM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption for &quot;Resource Indicators =
for OAuth 2.0&quot;<span lang=3D"EN-GB"><u></u><u></u></span></p>
</span><div>
<div>
<p class=3D"MsoNormal">=C2=A0<span lang=3D"EN-GB"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span class=3D"">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"color:#1155cc">https://too=
ls.ietf.org/html/<wbr>draft-campbell-oauth-resource-<wbr>indicators-02</spa=
n></a><span class=3D""><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat <span lang=3D"EN-GB"><u></u><u></u></span></span></p>
</div>
</div>
</div>
</div>
</div><span class=3D"">
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-GB">=
<br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></span></p=
>
</span></div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</div><span class=3D"">
<p class=3D"MsoNormal"><span lang=3D"EN-GB">IMPORTANT NOTICE: The contents =
of this email and any attachments are confidential and may also be privileg=
ed. If you are not the intended recipient, please notify
 the sender immediately and do not disclose the contents to any other perso=
n, use it for any purpose, or store or copy the information in any medium. =
Thank you.
<u></u><u></u></span></p>
</span></div>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div>

<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--000000000000e4eb480571609f19--


From nobody Thu Jul 19 14:12:04 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E46231310A7 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:12:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mB2B3LcxQuvY for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 14:11:58 -0700 (PDT)
Received: from mail-pl0-x236.google.com (mail-pl0-x236.google.com [IPv6:2607:f8b0:400e:c01::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8ECFE130FED for <oauth@ietf.org>; Thu, 19 Jul 2018 14:11:58 -0700 (PDT)
Received: by mail-pl0-x236.google.com with SMTP id p23-v6so4181928plo.6 for <oauth@ietf.org>; Thu, 19 Jul 2018 14:11:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Pcwi6WLd08+sURBUxhwVDD/ogRiNgdfXdi64yqUR7l4=; b=fzlsnPJVPSiqbKVe3d3QTLdXY6QXBsPRQil/Moc9Y1o5VuIhAzyeeqJyzzI/5OHP9q 1Qhb9I4+vNhGELM2cKsCmshxYH3WrrIIQloDveBZDhWp6jmNn7Qqyd8qVYLU1e+5OAaz /RhqUnoSNmArAVDGokM30gkheobdGLHzJ+JNv4bKH2CSTBtoYw8MQOoN+gtSTS3+UhXt 9cqCXIDKofuglKqfkIVQio1P9W5OREjFIkt0oCaeZqDfbRcpVgwRI1/NMBaEYlnO8kUC Q3rHm13kD5vuijjX7vErflJCGPql8LULHFPMlSe5AUXbbrn4GuM5Ix6cfjVmVNRBVNzu m+iQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Pcwi6WLd08+sURBUxhwVDD/ogRiNgdfXdi64yqUR7l4=; b=RJBRe087xvda7quFsp6nG/8l9tw5F7fnM05irXXFG5akqKRUvE0es/s8ykx2pzqI69 DaGwJJ8X0TQJdGRipe37g/rs+IF4kaFv015Ki+EM+SX0U5/l5zYPVhe8GigYqSfm70HQ NSeU/foc9qaf7wQv6cjPe9RYEOWDV0uWJMvUXmlcFL3lWRtynilBoazKovOEbkEZC2ZT I9EmrHLSP2iPJpSO9o2YcTT1OiBrTrwulKPs86zLyxzYzizEeFXfpBAj5fwjL6EXaymT GXVxTmnKhKXuhko7T6uCqkYMepfxFU74CD15j0gGcHZNwAws/C9gRt33SyKAaPzG7rXN U0EA==
X-Gm-Message-State: AOUpUlGh0A/73Ugw/dT8/mm4PCZ1jsshplzVmQG8sAU9xx9BrYUwpMzn 47g92uWoxl7Xe1suKWq3IMMP+m+dXuEWV0P7ThE=
X-Google-Smtp-Source: AAOMgpeq3op1QAM53P35FaPtHnUA7nh2NiRSEtYQ6sIqbM8PhZsK/HF3ItLNEe4csfUBKic1vqJVktFCKwVVMVSXcvY=
X-Received: by 2002:a17:902:8c84:: with SMTP id t4-v6mr11811571plo.100.1532034718085;  Thu, 19 Jul 2018 14:11:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Thu, 19 Jul 2018 14:11:37 -0700 (PDT)
In-Reply-To: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com>
References: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 19 Jul 2018 17:11:37 -0400
Message-ID: <CAD9ie-urtSu51s3HD+F7HPVAnR3ViFNwBaKfvXcxs2ht1xKLTw@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000027b757057160a104"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/QwfxQ0DX6qZpk6Qsu1WOLLLCxUQ>
Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 21:12:03 -0000

--00000000000027b757057160a104
Content-Type: text/plain; charset="UTF-8"

I'm supportive. :)

On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Hi all,
>
> This is the call for adoption of the 'Distributed OAuth' document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Hannes & Rifaat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--00000000000027b757057160a104
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I&#39;m supportive. :)</div><div class=3D"gmail_extra"><br=
><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Y=
usef <span dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=
=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<br><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div dir=3D"ltr"><div>Hi all,</div><div><br></div><div>This =
is the call for adoption of the &#39;Distributed OAuth&#39; document</div><=
div>following the positive call for adoption at the Montreal IETF meeting.<=
/div><div><br></div><div>Here is the document:</div><div><a href=3D"https:/=
/datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" target=3D"_blank"=
>https://datatracker.ietf.org/<wbr>doc/draft-hardt-oauth-<wbr>distributed/<=
/a></div><div><br></div><div>Please let us know by August 2nd whether you a=
ccept / object to the</div><div>adoption of this document as a starting poi=
nt for work in the OAuth</div><div>working group.</div><div><br></div><div>=
Regards,</div><div>Hannes &amp; Rifaat</div><div><br></div></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--00000000000027b757057160a104--


From nobody Thu Jul 19 15:36:44 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8A3C130ED1 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 15:36:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level: 
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zmxh4cKWCQ8g for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 15:36:38 -0700 (PDT)
Received: from mail-vk0-x232.google.com (mail-vk0-x232.google.com [IPv6:2607:f8b0:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7024B130E5B for <oauth@ietf.org>; Thu, 19 Jul 2018 15:36:38 -0700 (PDT)
Received: by mail-vk0-x232.google.com with SMTP id b77-v6so5190668vkb.5 for <oauth@ietf.org>; Thu, 19 Jul 2018 15:36:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=eHJWVFb2XeBmpdkBYNR4kwQQL6cI6tNjhIH3ozFhCX0=; b=swo/SnZe4mQ+Ikr05FHAeBjUlCkREsivbdKgFUzrKku8TKGqy4oDrM9cInsr0mll7G Sxnf8LK9c25LLcgQQ4FPD0wJZijocbYvxQIo1CUv923Wyh4OuRk6L5qt5nGYbzX5o5O5 4xqvqccY8rC9T6a29pbOWo7doa2SpE/CUnaWLdaRfqpkZmukY5oAgRrgmsqjBheWK4rI eHG33YgAwAVU1P+vRtclEHXV2Q1kv3AxJ265r8mJWVlPM3CA4gNoC2byRspoV/saAujQ xzpeyCdmqLlRvkI+JBnN0IEf6O9vV7Hk1JDmsL+qTr6EZLNq+QoTUoiPbceeZnlL4omC zjbA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=eHJWVFb2XeBmpdkBYNR4kwQQL6cI6tNjhIH3ozFhCX0=; b=BhBspXC1XOkl8lmjeEHqHWVmywaBmInOrTDN1vC1sMhonrnXWbex5Wly3QJtv9gj6S RH2tCW5OyZcyrYJ7n8V/vi9rp/yM+PBwHQDUX6o9iOfmoqt3KurT8SCWTJSAO22aWfLn WjzStMWMaiMezPf4m/hXNFM40V6+iUNuSKFi9ZLRoz2fCyMJAGYMTreqbjbzTqko3yUL aMejWsazHTx6hXqQOCVnt9IVZ+jrJX2tq90YKnBawpyaySPKX3iqFUl68h/EeORaz5aw PyUcwXifg++WjfJqJKqf0iE3xZ/N6xvEUOQeWioirG4JF7MI6+5cXMeS2Somz87TNB41 /5Dg==
X-Gm-Message-State: AOUpUlGgKjj+K0qgQTQpt1OVSuW63IrlD17msTmCtiB7cxnK40FB4iga BUd/RDYQDieBXn97o2zKg6kd6uPw9t+IoLiTyLu5QQ==
X-Google-Smtp-Source: AAOMgpczDG1/03XZJfjTnaFn5aMn0Baqaqe25gXLcbseGUOHy84vJYXp+EzQVu/VwEeK3NbqaDjreVXuW3X4lFJCLNY=
X-Received: by 2002:a1f:6285:: with SMTP id w127-v6mr7484097vkb.78.1532039797038;  Thu, 19 Jul 2018 15:36:37 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:6383:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 15:36:16 -0700 (PDT)
In-Reply-To: <CAD9ie-v4=r4XWVbvGryh24iQ_uXbHO8cd0=L2yc4XtbecmOvpw@mail.gmail.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <DM5PR00MB0296804218028EEB46142372F5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAAP42hARSW1jk7nE=kcDMajUj8Z=vPhD3ZcK6p_EenZhxLJfgQ@mail.gmail.com> <VI1PR0801MB2112EDA04FB2A57F2CF6CA5CFA520@VI1PR0801MB2112.eurprd08.prod.outlook.com> <CAAP42hAfsW2i-D64WzfCCZ8qf=+kq1ao-UHubrvVUT=HVuY0AQ@mail.gmail.com> <DM5PR00MB02967D18645764A7E598B4EFF5520@DM5PR00MB0296.namprd00.prod.outlook.com> <CAD9ie-v4=r4XWVbvGryh24iQ_uXbHO8cd0=L2yc4XtbecmOvpw@mail.gmail.com>
From: William Denniss <wdenniss@google.com>
Date: Thu, 19 Jul 2018 15:36:16 -0700
Message-ID: <CAAP42hAGvaLzm5i4GgB7vuu7=i5mJtOrFmkL1+n3wePXWU_+WQ@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>,  Hannes Tschofenig <Hannes.Tschofenig@arm.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e2f651057161cfd3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7CyR7NpHux6YBAwtl2fgKyLpodA>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 22:36:42 -0000

--000000000000e2f651057161cfd3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Yes there was.

+1 to adopt this document.


On Thu, Jul 19, 2018 at 2:11 PM, Dick Hardt <dick.hardt@gmail.com> wrote:

> William: there was discussion in the meeting about the PoP document using
> "resource" rather than "aud"
>
> On Thu, Jul 19, 2018 at 4:53 PM, Mike Jones <Michael.Jones=3D40microsoft.
> com@dmarc.ietf.org> wrote:
>
>> Microsoft=E2=80=99s Azure AD OAuth server has used the resource=3D param=
eter since
>> at least 2012 to indicate what resource the requested access token is to=
 be
>> for.
>>
>>
>>
>>                                                        -- Mike
>>
>>
>>
>> *From:* William Denniss <wdenniss@google.com>
>> *Sent:* Thursday, July 19, 2018 4:40 PM
>> *To:* Hannes Tschofenig <Hannes.Tschofenig@arm.com>
>> *Cc:* Mike Jones <Michael.Jones@microsoft.com>; oauth <oauth@ietf.org>
>> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
>> OAuth 2.0"
>>
>>
>>
>> Thanks! I assume then that there are use-cases for this that are outside
>> the Distributed OAuth use-case? Did we document them?  I'm supportive (o=
f
>> both drafts), but think we should get the rationale on the record since =
the
>> option to incorporate this spec in Distributed OAuth was raised in the
>> meeting.
>>
>>
>>
>>
>>
>> On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tschofenig <
>> Hannes.Tschofenig@arm.com> wrote:
>>
>> Hi William,
>>
>>
>>
>> that was the idea.
>>
>>
>>
>> Ciao
>>
>> Hannes
>>
>>
>>
>> *From:* OAuth [mailto:oauth-bounces@ietf.org] *On Behalf Of *William
>> Denniss
>> *Sent:* 19 July 2018 16:32
>> *To:* Mike Jones
>> *Cc:* oauth
>> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
>> OAuth 2.0"
>>
>>
>>
>> Question: if this is adopted along with https://datatracker.ietf.
>> org/doc/draft-hardt-oauth-distributed/, is the plan for this spec to be
>> the authoritative definition, and Distributed OAuth to take a reference
>> instead of redefining?
>>
>>
>>
>> On Thu, Jul 19, 2018 at 1:29 PM, Mike Jones <
>> Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:
>>
>> I support adoption.  The =E2=80=9Cresource=E2=80=9D request parameter th=
at it defines is
>> already widely used.
>>
>>
>>
>>                                                        -- Mike
>>
>>
>>
>> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of *Rifaat Shekh-Yusef
>> *Sent:* Thursday, July 19, 2018 4:02 PM
>> *To:* oauth <oauth@ietf.org>
>> *Subject:* [OAUTH-WG] Call for adoption for "Resource Indicators for
>> OAuth 2.0"
>>
>>
>>
>> Hi all,
>>
>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
>> document
>> following the positive call for adoption at the Montreal IETF meeting.
>>
>> Here is the document:
>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>
>> Please let us know by August 2nd whether you accept / object to the
>> adoption of this document as a starting point for work in the OAuth
>> working group.
>>
>> Regards,
>> Rifaat
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose the
>> contents to any other person, use it for any purpose, or store or copy t=
he
>> information in any medium. Thank you.
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>

--000000000000e2f651057161cfd3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div style=3D"font-size:small;text-decoration-style:initia=
l;text-decoration-color:initial">Yes there was.</div><div style=3D"font-siz=
e:small;text-decoration-style:initial;text-decoration-color:initial"><br></=
div><div style=3D"font-size:small;text-decoration-style:initial;text-decora=
tion-color:initial">+1 to adopt this document.</div><br><div class=3D"gmail=
_extra"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 2:11 PM, Dic=
k Hardt <span dir=3D"ltr">&lt;<a href=3D"mailto:dick.hardt@gmail.com" targe=
t=3D"_blank">dick.hardt@gmail.com</a>&gt;</span> wrote:<br><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div dir=3D"ltr">William: there was discussion in the meetin=
g about the PoP document using &quot;resource&quot; rather than &quot;aud&q=
uot;</div><div class=3D"HOEnZb"><div class=3D"h5"><div class=3D"gmail_extra=
"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 4:53 PM, Mike Jone=
s <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@d=
marc.ietf.org" target=3D"_blank">Michael.Jones=3D40microsoft.<wbr>com@dmarc=
.ietf.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_7864589206657182603m_4022479633966232699WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">Microsoft=E2=80=99s Az=
ure AD OAuth server has used the resource=3D parameter since at least 2012 =
to indicate what resource the requested access token is to be for.<u></u><u=
></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> William Denniss &lt;<a href=3D"mailto:w=
denniss@google.com" target=3D"_blank">wdenniss@google.com</a>&gt; <br>
<b>Sent:</b> Thursday, July 19, 2018 4:40 PM<br>
<b>To:</b> Hannes Tschofenig &lt;<a href=3D"mailto:Hannes.Tschofenig@arm.co=
m" target=3D"_blank">Hannes.Tschofenig@arm.com</a>&gt;<br>
<b>Cc:</b> Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com" ta=
rget=3D"_blank">Michael.Jones@microsoft.com</a>&gt;; oauth &lt;<a href=3D"m=
ailto:oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a>&gt;<span><br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></span></p><span>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Thanks! I assume then that there are use-cases for t=
his that are outside the Distributed OAuth use-case? Did we document them?=
=C2=A0 I&#39;m supportive (of both drafts), but think we should get the rat=
ionale on the record since the option to incorporate
 this spec in Distributed OAuth was raised in the meeting.<u></u><u></u></p=
>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</span><div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div><span>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 1:34 PM, Hannes Tschofenig &=
lt;<a href=3D"mailto:Hannes.Tschofenig@arm.com" target=3D"_blank">Hannes.Ts=
chofenig@arm.com</a>&gt; wrote:<u></u><u></u></p>
</span><blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;pad=
ding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div><span>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Hi Will=
iam,
</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">=C2=A0<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">that wa=
s the idea.
</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><a name=3D"m_7864589206657182603_m_40224796339662326=
99_m_-907124991211456452__MailEndCompose"><span lang=3D"EN-GB" style=3D"col=
or:#1f497d">=C2=A0</span></a><span></span><span lang=3D"EN-GB"><u></u><u></=
u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Ciao</s=
pan><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">Hannes<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB" style=3D"color:#1f497d">=C2=A0<=
/span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,sans-serif">From:</span></b><span style=3D"font-size:10.0pt;f=
ont-family:&quot;Tahoma&quot;,sans-serif"> OAuth [mailto:<a href=3D"mailto:=
oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>William Denniss<br>
<b>Sent:</b> 19 July 2018 16:32<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;</span><span lang=3D"EN-GB"><u></u><u></u></span></p=
>
</span><div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
<div><span>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Question: if this is adopted al=
ong with=C2=A0<a href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth=
-distributed/" target=3D"_blank"><span style=3D"font-size:9.5pt;color:#1155=
cc">https://datatracker.ietf.<wbr>org/doc/draft-hardt-oauth-dist<wbr>ribute=
d/</span></a>,
 is the plan for this spec to be the authoritative definition, and Distribu=
ted OAuth to take a reference instead of redefining?<u></u><u></u></span></=
p>
</span><div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
<div><span>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">On Thu, Jul 19, 2018 at 1:29 PM=
, Mike Jones &lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ie=
tf.org" target=3D"_blank">Michael.Jones=3D40microsoft.com<wbr>@dmarc.ietf.o=
rg</a>&gt;
 wrote:<u></u><u></u></span></p>
</span><div>
<div><span>
<p class=3D"MsoNormal"><span style=3D"color:#002060">I support adoption.=C2=
=A0 The =E2=80=9Cresource=E2=80=9D request parameter that it defines is alr=
eady widely used.</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0</span><span lan=
g=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike</span><span lang=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0</span><span lan=
g=3D"EN-GB"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 4:02 PM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption for &quot;Resource Indicators =
for OAuth 2.0&quot;<span lang=3D"EN-GB"><u></u><u></u></span></p>
</span><div>
<div>
<p class=3D"MsoNormal">=C2=A0<span lang=3D"EN-GB"><u></u><u></u></span></p>
<div>
<p class=3D"MsoNormal"><span>Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"color:#1155cc">https://too=
ls.ietf.org/html/dr<wbr>aft-campbell-oauth-resource-in<wbr>dicators-02</spa=
n></a><span><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat <span lang=3D"EN-GB"><u></u><u></u></span></span></p>
</div>
</div>
</div>
</div>
</div><span>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-GB">=
<br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><u></u><u></u></span></p=
>
</span></div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=C2=A0<u></u><u></u></span></p>
</div>
</div>
</div>
</div>
</div><span>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">IMPORTANT NOTICE: The contents =
of this email and any attachments are confidential and may also be privileg=
ed. If you are not the intended recipient, please notify
 the sender immediately and do not disclose the contents to any other perso=
n, use it for any purpose, or store or copy the information in any medium. =
Thank you.
<u></u><u></u></span></p>
</span></div>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div>

<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
<br></blockquote></div><br></div>
</div></div></blockquote></div><br></div></div>

--000000000000e2f651057161cfd3--


From nobody Thu Jul 19 15:42:58 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 555AE130FA8 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 15:42:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1HiCFPyCejWq for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 15:42:46 -0700 (PDT)
Received: from mail-it0-x22e.google.com (mail-it0-x22e.google.com [IPv6:2607:f8b0:4001:c0b::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1595A130FFE for <oauth@ietf.org>; Thu, 19 Jul 2018 15:42:44 -0700 (PDT)
Received: by mail-it0-x22e.google.com with SMTP id 16-v6so12133668itl.5 for <oauth@ietf.org>; Thu, 19 Jul 2018 15:42:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=DZVTMY8bjk0avcc1zp0jp5QFoNRn/O2ChVrXoHejISY=; b=ClcxDBDTKjl0ixGeeMmM4vLn5ilwaoHGMAtd+sY06smAupkx+1M+ZLQdK1peF2YzRG nYp5FT7hlvp9ohmN0l/PknT0X8CRZ/SkoNMgjrJibDWmKVPqtvN8+OsVzIxPfYOpf1Bo ECJYvj4G2w4kFLJbzaBFQKrYg0LI3NVqDFXzE=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=DZVTMY8bjk0avcc1zp0jp5QFoNRn/O2ChVrXoHejISY=; b=lpcRj8iTAnRKOWa8aM30YG9mtvXzqpTEzsv1oQupYiCKX/gHmYDpBYO2rn59xgq8zc pvutXxCoD80JKrKK4canzR0nONSv3z/vE8scfLD8Ed7tsop1gitnmx+HHNfthBJHSqIN d+ZqrnO5sa9M7IX2rcJgZNNoT8T7AQa1v+iyiWWZ4t0A+KK4ILQZ2gIIr1bdFkyt8Spo tmJ87KoMzgK3miUKqMKQhedAYOd9JEOacZHuKcMVcFRwGlRfj3wdGsED4aN1wa+SQkSq jmrkgGaGMJ39LDJronX3k9m4G8RuCjByxngw957McmZfkK4y1u64t8ftKXV+JqEfiIW7 s8kQ==
X-Gm-Message-State: AOUpUlHD2yWyKamnSBpRRQn13N//dCeeWzMW+j/TSsm3neDkryb9KK8c x1H4D2s0WWdrSPRGhkZiXT1u5WiYcgsJ8DfYopuSkMx9tczaeHm3ziwE59szGGIkkoiA3vJwUQM 62/Xr/dVMlHrOmw==
X-Google-Smtp-Source: AAOMgpddJrJC2V9Kknuf77fvUwer0VSoNgICXrVlN/5Ks4fYcRQiq0IKhH51MXbZDNZ+rn59Bpi7Vw3hBHqxJKbFAbc=
X-Received: by 2002:a24:19d5:: with SMTP id b204-v6mr7054420itb.25.1532040163276;  Thu, 19 Jul 2018 15:42:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Thu, 19 Jul 2018 15:42:12 -0700 (PDT)
In-Reply-To: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 19 Jul 2018 18:42:12 -0400
Message-ID: <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b6d4cb057161e58e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ZuYeVYc3ldds7k4YvPqBYfpmTqY>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 22:42:57 -0000

--000000000000b6d4cb057161e58e
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I support adoption of this document.

On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000b6d4cb057161e58e
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I support adoption of this document. <br></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 4:0=
1 PM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.iet=
f@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<=
br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">

<span style=3D"font-size:small;text-decoration-style:initial;text-decoratio=
n-color:initial;float:none;display:inline">Hi all,</span><br style=3D"font-=
size:small;text-decoration-style:initial;text-decoration-color:initial"><br=
 style=3D"font-size:small;text-decoration-style:initial;text-decoration-col=
or:initial"><span style=3D"font-size:small;text-decoration-style:initial;te=
xt-decoration-color:initial;float:none;display:inline">This is the call for=
 adoption of the &#39;Resource Indicators for OAuth 2.0&#39; document</span=
><br style=3D"font-size:small;text-decoration-style:initial;text-decoration=
-color:initial"><span style=3D"font-size:small;text-decoration-style:initia=
l;text-decoration-color:initial;float:none;display:inline">following the po=
sitive call for adoption at the Montreal IETF meeting.</span><br style=3D"f=
ont-size:small;text-decoration-style:initial;text-decoration-color:initial"=
><br style=3D"font-size:small;text-decoration-style:initial;text-decoration=
-color:initial"><span style=3D"font-size:small;text-decoration-style:initia=
l;text-decoration-color:initial;float:none;display:inline">Here is the docu=
ment:</span><br style=3D"font-size:small;text-decoration-style:initial;text=
-decoration-color:initial"><a href=3D"https://tools.ietf.org/html/draft-cam=
pbell-oauth-resource-indicators-02" rel=3D"noreferrer" style=3D"color:rgb(1=
7,85,204);font-size:small" target=3D"_blank">https://tools.ietf.org/html/<w=
br>draft-campbell-oauth-resource-<wbr>indicators-02</a><br style=3D"font-si=
ze:small;text-decoration-style:initial;text-decoration-color:initial"><br s=
tyle=3D"font-size:small;text-decoration-style:initial;text-decoration-color=
:initial"><span style=3D"font-size:small;text-decoration-style:initial;text=
-decoration-color:initial;float:none;display:inline">Please let us know by =
August 2nd whether you accept / object to the</span><br style=3D"font-size:=
small;text-decoration-style:initial;text-decoration-color:initial"><span st=
yle=3D"font-size:small;text-decoration-style:initial;text-decoration-color:=
initial;float:none;display:inline">adoption of this document as a starting =
point for work in the OAuth</span><br style=3D"font-size:small;text-decorat=
ion-style:initial;text-decoration-color:initial"><span style=3D"font-size:s=
mall;text-decoration-style:initial;text-decoration-color:initial;float:none=
;display:inline">working group.</span><br style=3D"font-size:small;text-dec=
oration-style:initial;text-decoration-color:initial"><br style=3D"font-size=
:small;text-decoration-style:initial;text-decoration-color:initial"><span s=
tyle=3D"font-size:small;text-decoration-style:initial;text-decoration-color=
:initial;float:none;display:inline">Regards,</span><br style=3D"font-size:s=
mall;text-decoration-style:initial;text-decoration-color:initial"><span sty=
le=3D"font-size:small;text-decoration-style:initial;text-decoration-color:i=
nitial;float:none;display:inline">Rifaat</span>

<br></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000b6d4cb057161e58e--


From nobody Thu Jul 19 16:55:59 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F303130E43 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 16:55:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Epq0Na-KnOQL for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 16:55:54 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-he1eur02on0612.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe05::612]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C89D130E6D for <oauth@ietf.org>; Thu, 19 Jul 2018 16:55:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hqZ8y2jpucqIYWWm2A37yFmWzHCxPOcD8/5VvnDgXko=; b=Kv7d5pNpKX5RFW+/516XOJYjOF0aUbzWNjIKoOaYqjXjuvEaTJkCvsnrxFsjrCa4x0aqBQXt90sdVqNIMC05P8XMnla0fx/zuQVxfsUvq4t/hNLFP91CkWKBT8Ba5oDbIlrnr/qxJ5CUYlbD5NABRnX+IYphZDuaOR2jeVbK0vk=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1325.eurprd08.prod.outlook.com (10.167.197.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.21; Thu, 19 Jul 2018 23:55:43 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Thu, 19 Jul 2018 23:55:43 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tpWfx6ee5zikCyGLNHikwcWqSXN4Ng
Date: Thu, 19 Jul 2018 23:55:43 +0000
Message-ID: <VI1PR0801MB2112EDC2FFEAEDEC180E7A24FA520@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
In-Reply-To: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1325; 6:DdFrsPHlfedB3HNZC7nnDWa8yw37GL303p/AxH7NP9Y9VxZnnn7caroGjSPVcX1Zbw2YtYVXWw5G2f4yAfcky+4tp/6WyDHY/gPZHI7ztfTwn73Y3zCR6r0aaRtwztSpzZQza8EGZDgk/mGQ+FQSsbWu462zcA46CEnT0veXP6I6E0L8xKzWB+Mddclol2FJdjP9WOfiZDDifWg4y7Ds5HUmA89uk6T2ogsAuLmarATac8r2nXvktmeOM8f3t1zNaAtzP5y2DfGTLOco8FwP9eQKT5faUwp04VWp4zF+b//pzFXUn2dF/OqTdDr0RgerwW/DDXSaqh9ETSi3sh15/8uae45A7EccAo0QJHRdc5GccCcDLDRpYztpA4Ksi1OTz2m/39d8vt1oigjdhBEYt5aZaKWusoaiJd/KemV/aj4WZXwutbYsEyEF3Ki4CRUJBNCvqNDJMin3Ee8O7vemjw==; 5:twJJ70sn8yy0xJQZtiQYAXGu+3jPiSkOpn3lMeL90FHpS4xq6k/miWItSEJ4X24aAveTCst2Jo8kjaPNb66ewd+XiL+9V39EK1RJP1brs5yE9jJVPhQZkTAZhDZpBIXghh5FHXotklD79qPQtFOZp2xyO3p5wxcN4jWC437C5dc=; 7:amDhi4x2q0ik6SGBn9QmUld3+P9oR77TF/duwei5lBHusm3XbrO4Y66I5NhSDMuDqKbJhkQgBDk7WRJY/WX8BWdagC4rCwz2IfZfVwGe8n/ip7fFwCAvMWY+zO3vJJIOpY1uQNeqkCPlb9FPoSTgEBN51WTod/NbIZ0XZTGzEjXZVpn3ZMZTdx6ZT8yY+VZWqfZd6Qi3VDJjB5ZV+z6uB7dmt5tBcgoxPKg1TybH/S+mK2coAC7SbNSs0ZGg5IKj
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 898d6372-c27d-4a41-9d86-08d5edd323a5
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(48565401081)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1325; 
x-ms-traffictypediagnostic: VI1PR0801MB1325:
x-microsoft-antispam-prvs: <VI1PR0801MB132570C561C3206BEAB1A263FA520@VI1PR0801MB1325.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1325; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1325; 
x-forefront-prvs: 0738AF4208
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(136003)(39860400002)(376002)(346002)(396003)(189003)(199004)(40434004)(53754006)(229853002)(5660300001)(478600001)(99286004)(33656002)(9686003)(6306002)(54896002)(236005)(55016002)(2906002)(476003)(2900100001)(486006)(6436002)(11346002)(446003)(606006)(110136005)(72206003)(966005)(6116002)(790700001)(106356001)(3846002)(14454004)(105586002)(316002)(7736002)(53936002)(39060400002)(6246003)(76176011)(7696005)(256004)(102836004)(26005)(53546011)(6506007)(14444005)(97736004)(74316002)(186003)(5250100002)(5024004)(66066001)(81166006)(81156014)(8936002)(8676002)(86362001)(25786009)(68736007); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1325; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 5R2eUQIhYjqe7ge710nM2oU0haz9XgMXs6GoaaA/MFOZ+E3bJ3sgLJYOqdPJoU9ZuNvagibi6hhuBaYJH2uZwLRdiYuCsWAzRTwjEzEESE8V3iMby7RxBFGvkGbTM20y6hLEP8YOmy75Ri1ZBs/QBunr43Ph7DYfOLOfZOtXvry2U8oajJYQqLheio57JUcBP+NqFm6gBeoSXR4X10ANoLDVOxX84VQNl8uDVz/eTFAY+c5EvPVyIfTQRKliPxCPzUZnA0OEGAIjiv80t7PtQ+PI8TJR8tycemJOrEmWbkwCKYR3L6YX8j90NwigbrrZHtZAQ4LBOAD88OHnSugAIGKVZMwPMDt2J3rWIzAXqiI=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2112EDC2FFEAEDEC180E7A24FA520VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 898d6372-c27d-4a41-9d86-08d5edd323a5
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2018 23:55:43.3781 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1325
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/J3GeZ4EmI6_Jpyc-OLf34riYivs>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 23:55:58 -0000

--_000_VI1PR0801MB2112EDC2FFEAEDEC180E7A24FA520VI1PR0801MB2112_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB2112EDC2FFEAEDEC180E7A24FA520VI1PR0801MB2112_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB2112EDC2FFEAEDEC180E7A24FA520VI1PR0801MB2112_--


From nobody Thu Jul 19 23:20:17 2018
Return-Path: <n-sakimura@nri.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C33EC130E74 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 23:20:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level: 
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nri365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nac0gnsjsaua for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 23:20:11 -0700 (PDT)
Received: from nrifs02.index.or.jp (nrigw01.index.or.jp [133.250.250.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BBF8130EA7 for <oauth@ietf.org>; Thu, 19 Jul 2018 23:20:08 -0700 (PDT)
Received: from nrimmfm052.index.or.jp (unknown [172.19.246.144]) by nrifs02.index.or.jp (Postfix) with ESMTP id 6EF1A196874; Fri, 20 Jul 2018 15:20:07 +0900 (JST)
Received: from index.or.jp (unknown [172.19.246.151]) by nrimmfm052.index.or.jp (Postfix) with ESMTP id EF26A4E0046; Fri, 20 Jul 2018 15:20:06 +0900 (JST)
Received: from nriea05.index.or.jp (localhost.localdomain [127.0.0.1]) by pps.mf051 (8.15.0.59/8.15.0.59) with SMTP id w6K6K6MZ030874; Fri, 20 Jul 2018 15:20:06 +0900
Received: from nrims00a.nri.co.jp ([192.50.135.11]) by nriea05.index.or.jp with ESMTP id w6K6K6vB030870; Fri, 20 Jul 2018 15:20:06 +0900
Received: from nrims00a.nri.co.jp (localhost.localdomain [127.0.0.1]) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K6K6XV023941; Fri, 20 Jul 2018 15:20:06 +0900
Received: (from mailnull@localhost) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.0/Submit) id w6K6K63V023939; Fri, 20 Jul 2018 15:20:06 +0900
X-Authentication-Warning: nrims00a.nri.co.jp: mailnull set sender to n-sakimura@nri.co.jp using -f
Received: from nrizmf14.index.or.jp ([172.100.25.23]) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K6K67C023935; Fri, 20 Jul 2018 15:20:06 +0900
Received: from CUEXE01PA.cu.nri.co.jp (192.51.23.31) by CUEXM03PA.cu.nri.co.jp (172.159.253.23) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 15:20:05 +0900
Received: from APC01-HK2-obe.outbound.protection.outlook.com (65.55.88.216) by ex.nri.co.jp (192.51.23.33) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 15:20:05 +0900
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nri365.onmicrosoft.com; s=selector1-cu-nri-co-jp; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dTELYUUz0vbOIwOQGpu8qieUNzyjqc4bypEOAX9gwqk=; b=Rv3PM8zT2oI29JX1XSNI+XNMjP5qzP0ROJPfoyqlBZCdjbqCMdCnoG4RXoN6oS53JCzS5HPWV+5ec7WCd+D1q2vkXuQmWDL7XEtYL4wOv6Ppo6sG2lrrx05KnxfXhGLD7sV/hLskN9gz/zXLXR17e8oEe6NxJH2tVy9E5aGqS1M=
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com (52.133.184.14) by TY2PR01MB1897.jpnprd01.prod.outlook.com (52.133.181.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.16; Fri, 20 Jul 2018 06:20:03 +0000
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4]) by TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4%2]) with mapi id 15.20.0952.022; Fri, 20 Jul 2018 06:20:03 +0000
From: n-sakimura <n-sakimura@nri.co.jp>
To: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, "Rifaat Shekh-Yusef" <rifaat.ietf@gmail.com>
CC: oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tuYAqf5o+kk0m6ex6lcWR7cKSXJEAAgAB/06A=
Date: Fri, 20 Jul 2018 06:20:03 +0000
Message-ID: <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com>
In-Reply-To: <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailadviser: 20170719
authentication-results: spf=none (sender IP is ) smtp.mailfrom=n-sakimura@cu.nri.co.jp; 
x-originating-ip: [133.250.250.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; TY2PR01MB1897; 6:/BopZhQAj1/KWI1CHDpuzsHhSmlgCmR4Kd9jgCJNL0+mcqdTyHCedShIGNrjePcrxvB9cDD3Pkb8cn+DQGNNxFLh7Ho6n7TiMJh41Koo4pZ8eUTQ4zPYYqDqf7BbI81dEDMvdM/c7Hgi0fAQGMVA0eOLSMgnoafkK8Xke+RZmkbCFkNLZ+JLELpIxuS/ZSt2duihVqcSVnLwN3uquBYv6T3rijzJBpdo9mmMRmaDnu0n87iqy4UQpF/DQ0Nj9B0JLNChSto05W8+zSFb2bOmCCOi+zZBvwIfZMhm79loNkoVUd7GVcMTlYKkcqqvEd/SeiAFbjxYQZ8wv8porDsPQAZ0Ij2paWiJOqAdL7XUisQQgWTr+LiEg4xPiK1/CtaGLMwjXVQogDN1jPXB0liAeXeFkOQDnuFej6B8fGRy4fLlJDB7LHD4J1WO+MDvk3if96aoamnJuV9RYlmEbwUgoQ==; 5:A6W9rVA0hxDRzYUNNcN+CmdfZJH/H3c/O87uDXsaG1cDz/ZoXg9FKg8xO34pX7+El1R0uYFQ528HSKjh6UyX8R8ECU7DV7vjefovfK5CirDxUPLNSVXdYY8gZD3um2klln57TzGxpnmgLDaLjzGirp7ya/fe63bQKZMM7rfOtlw=; 7:szV8oTZntokX+zSbvuzTL2vnyTU/d3nw8euSgBDh3qkkJxTeg9KZ/Kq3FG2gVbXDIoesxgrsbUqFZ4q52EBmVwXtdPQ+9FRCDVz9aWGCZwscIS/HDaeurEMEbWwAAvu2ByzoRMN8V5VPc9CV76uS4/RiFi5lhzKjDirq0s16s6cP6Syl/KWeZ+CHmthwtoqj5Do8GfgCIpGWCisjwZQtvF0phP/TaIv4GIpneWceDtE923MWuTjbm84U2kmMoGx9
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 58e6a8a2-f5fc-4cd0-7a19-08d5ee08d4ae
x-microsoft-antispam: UriScan:(223705240517415); BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(5600053)(711020)(2017052603328)(7153060)(7193020); SRVR:TY2PR01MB1897; 
x-ms-traffictypediagnostic: TY2PR01MB1897:
x-microsoft-antispam-prvs: <TY2PR01MB1897C7C5D5B49A8C922AEDF9F9510@TY2PR01MB1897.jpnprd01.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(85827821059158)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(944501410)(52105095)(149027)(150027)(6041310)(20161123560045)(20161123562045)(20161123558120)(2016111802025)(20161123564045)(6072148)(6043046)(201708071742011)(7699016); SRVR:TY2PR01MB1897; BCL:0; PCL:0; RULEID:; SRVR:TY2PR01MB1897; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39840400004)(136003)(376002)(366004)(396003)(346002)(189003)(199004)(53754006)(14444005)(5024004)(256004)(99286004)(790700001)(76176011)(11346002)(6116002)(446003)(9686003)(3846002)(316002)(486006)(102836004)(33656002)(53546011)(476003)(110136005)(26005)(5660300001)(236005)(186003)(7696005)(74482002)(6506007)(6436002)(606006)(68736007)(966005)(25786009)(14454004)(19609705001)(81166006)(6306002)(81156014)(8676002)(2900100001)(55016002)(66066001)(478600001)(39060400002)(8936002)(4326008)(2906002)(53936002)(6246003)(54896002)(74316002)(105586002)(86362001)(7736002)(97736004)(5250100002)(229853002)(106356001); DIR:OUT; SFP:1102; SCL:1; SRVR:TY2PR01MB1897; H:TY2PR01MB2297.jpnprd01.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: cu.nri.co.jp does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 4DQKvtzijVYiFCCMHHqorjd3BbmcqrLs2ylLqXB9f7Vq+VsR06sufpAX5pYXTRnemTGp5yy9opxziceA0kJcJVgPQ0gDay+3IiFvtyXNyKIbqp6/1fqmuOvy+e2DPxDVC2hcbbrhZJNW/dpMl1ckwSWV1TMO4giEfdDuHAEayqsd4I6fsn1wLZyGs0sOm5dBoV1yVQ8lxo/s36/f6qIG+cO3CrcMVYDocitI19ZsrM33UynGRjPAip12rjZnPdyKhHr3lBe1twr4Zc0XVOUI9lfMrfEV4SqIPR+4lWB6XYDhq42AZfDQjoVvk4SzRR8eaDIUl8kcau+XX8tJxCH6l2l5EmnQB55KdU43lqKFBSc=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB22971D8FB9BCA1513C3794E9F9510TY2PR01MB2297jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 58e6a8a2-f5fc-4cd0-7a19-08d5ee08d4ae
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 06:20:03.7209 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e3e360d9-7e7f-48d5-ac33-3c5de61f0a75
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY2PR01MB1897
X-OrganizationHeadersPreserved: TY2PR01MB1897.jpnprd01.prod.outlook.com
X-CrossPremisesHeadersPromoted: CUEXE01PA.cu.nri.co.jp
X-CrossPremisesHeadersFiltered: CUEXE01PA.cu.nri.co.jp
X-OriginatorOrg: cu.nri.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/x_Zf5KCt1jTqMVsJ1HogUcHuiqE>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 06:20:13 -0000

--_000_TY2PR01MB22971D8FB9BCA1513C3794E9F9510TY2PR01MB2297jpnp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_TY2PR01MB22971D8FB9BCA1513C3794E9F9510TY2PR01MB2297jpnp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_TY2PR01MB22971D8FB9BCA1513C3794E9F9510TY2PR01MB2297jpnp_--


From nobody Thu Jul 19 23:21:43 2018
Return-Path: <n-sakimura@nri.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BBEA130EE5 for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 23:21:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level: 
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nri365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id riT-4XBTyxby for <oauth@ietfa.amsl.com>; Thu, 19 Jul 2018 23:21:33 -0700 (PDT)
Received: from nrifs04.index.or.jp (nrigw01.index.or.jp [133.250.250.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBBCB131066 for <oauth@ietf.org>; Thu, 19 Jul 2018 23:21:32 -0700 (PDT)
Received: from nrimmfm052.index.or.jp (unknown [172.19.246.144]) by nrifs04.index.or.jp (Postfix) with ESMTP id 78C76472EDF; Fri, 20 Jul 2018 15:21:32 +0900 (JST)
Received: from index.or.jp (unknown [172.19.246.151]) by nrimmfm052.index.or.jp (Postfix) with ESMTP id 139264E0046; Fri, 20 Jul 2018 15:21:32 +0900 (JST)
Received: from nriea02.index.or.jp (localhost.localdomain [127.0.0.1]) by pps.mf051 (8.15.0.59/8.15.0.59) with SMTP id w6K6LWom014072; Fri, 20 Jul 2018 15:21:32 +0900
Received: from nrims00b.nri.co.jp ([192.50.135.12]) by nriea02.index.or.jp with ESMTP id w6K6LVcn014069; Fri, 20 Jul 2018 15:21:31 +0900
Received: from nrims00b.nri.co.jp (localhost.localdomain [127.0.0.1]) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K6LVDV043933; Fri, 20 Jul 2018 15:21:31 +0900
Received: (from mailnull@localhost) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.0/Submit) id w6K6LVbF043932; Fri, 20 Jul 2018 15:21:31 +0900
X-Authentication-Warning: nrims00b.nri.co.jp: mailnull set sender to n-sakimura@nri.co.jp using -f
Received: from nrizmf13.index.or.jp ([172.100.25.22]) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K6LVJa043929; Fri, 20 Jul 2018 15:21:31 +0900
Received: from CUEXE02PA.cu.nri.co.jp (192.51.23.32) by CUEXM01SA.cu.nri.co.jp (172.59.253.43) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 15:21:30 +0900
Received: from APC01-SG2-obe.outbound.protection.outlook.com (65.55.88.243) by ex.nri.co.jp (192.51.23.33) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 15:21:30 +0900
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nri365.onmicrosoft.com; s=selector1-cu-nri-co-jp; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gvkoz76bygBoM6lfhCxiRXl7ZkU0VB9g1UUShaFmVHI=; b=F1D8DrmWJVpL0HOuoDqe6MUuaEkJSzTU1CUu1KHALHu6xhUcMKBzYfyR3SjDhyyulJzNp5kDPVXDp3A5PIS9hJzsgO/4d616pTfv3V3fNDLsQ+KhXLlgByOfTw8nWrTL/OweIiLa/VG+EholiRQnkI0R5+HvAI+vXYEYg4m1P/E=
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com (52.133.184.14) by TY2PR01MB2089.jpnprd01.prod.outlook.com (52.133.183.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.16; Fri, 20 Jul 2018 06:21:28 +0000
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4]) by TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4%2]) with mapi id 15.20.0952.022; Fri, 20 Jul 2018 06:21:28 +0000
From: n-sakimura <n-sakimura@nri.co.jp>
To: Dick Hardt <dick.hardt@gmail.com>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Distributed OAuth"
Thread-Index: AQHUH5v7xHgfGQvfqEWCEMwVBLmh76SXCvCAgACZfpA=
Date: Fri, 20 Jul 2018 06:21:28 +0000
Message-ID: <TY2PR01MB229756ABC3B1098A89B11F9DF9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
References: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com> <CAD9ie-urtSu51s3HD+F7HPVAnR3ViFNwBaKfvXcxs2ht1xKLTw@mail.gmail.com>
In-Reply-To: <CAD9ie-urtSu51s3HD+F7HPVAnR3ViFNwBaKfvXcxs2ht1xKLTw@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailadviser: 20170719
authentication-results: spf=none (sender IP is ) smtp.mailfrom=n-sakimura@cu.nri.co.jp; 
x-originating-ip: [133.250.250.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; TY2PR01MB2089; 6:FoTS6SMhZJUt/DB8XoK7UCzPRRG4bb2Q5aKIH7a4F2txJytBcn+Fu5JNRCPsoML4jbyyvB5jz498mvyQWI62O8XJU5ADCl8ZoS++GcwIdJkCqL8kcK0Q+8tGEieUVyjxI9vsfS7PDqssv4Th9Yi9XgqO3/7onmQUhcmangIVfwXtNSGkk7NQUaAIg3wBuSSc1LhF9WmBNQig2Xj/kUDGJW4szAliQIIlDLz9GxjNsI6lk5xRT6TVFHZAbJq433Rt1LvoZI9JE52E1DsrQWhljFPUyaBJWQP+v9cYMJESoVraNNj7IPPx6ImRGWQKkhYPo/5EHSSt8RREF+MV5kOSQAtPFZPPjjeg3s2v7CwIuv7tgR8T+FuHDtwMt6fp/wYX7jUCzpHg4UPWBPH4v4tk3+Wx0n1XWbR15lUzgMH9pNmd1sOJBBlEogwWPjjFaUne8O9/I7TGukuRJ+oJLmCBrg==; 5:vf1MCzjYQLYHWCkOvUp/xghEar2LGxP1GQbQXoNQn7tkFSl9z7Ss5aXJYIxqLJHK9HctQLgNT3a8mL0MV06RaYlQTfDQKHt1W2ezZfZnytRcYrclx0LrTkOVJ5yH4zQl2nvLW4MjNzAhYEri/Czmal03Ay4fog6ypPlLZ62EvWo=; 7:x/w0vsGfCx5SY59Uz/O/fN8RfBtIb4BD7ersJVJlLWuQ53sDtkf8nq03opds1sCBj7g4zV/L1hbCoL/m89xHp7gNjlly/0C6eeiQLAW6HwtR5hxEJDNFchPXShmj2mmVinj24MtkWfpSVA21d1MmZS4vq6S6Dh18wRtEo6o4fWGXpH0WHF+VkMmTT9kLcMaZQ4eJu13pormxH4GRlxODYhPh2ZHTiUR3Fzkj3ad6ouzbHTpJXxnu6WUA1M7Toq0D
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: ba6cd4db-9842-460f-f701-08d5ee090755
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(5600053)(711020)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(2017052603328)(7153060)(7193020); SRVR:TY2PR01MB2089; 
x-ms-traffictypediagnostic: TY2PR01MB2089:
x-microsoft-antispam-prvs: <TY2PR01MB2089AA831CFD05646EC32126F9510@TY2PR01MB2089.jpnprd01.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(120809045254105)(85827821059158)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(944501410)(52105095)(149027)(150027)(6041310)(20161123560045)(20161123562045)(20161123558120)(2016111802025)(20161123564045)(6072148)(6043046)(201708071742011)(7699016); SRVR:TY2PR01MB2089; BCL:0; PCL:0; RULEID:; SRVR:TY2PR01MB2089; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(39840400004)(366004)(346002)(136003)(376002)(199004)(189003)(53754006)(186003)(102836004)(74482002)(2906002)(86362001)(54896002)(6306002)(26005)(6436002)(55016002)(68736007)(5660300001)(229853002)(110136005)(53936002)(9686003)(7736002)(39060400002)(66066001)(6116002)(790700001)(97736004)(4326008)(81166006)(236005)(106356001)(105586002)(33656002)(316002)(6246003)(14454004)(446003)(966005)(81156014)(25786009)(3846002)(19609705001)(8676002)(53546011)(6506007)(2900100001)(74316002)(486006)(8936002)(11346002)(5250100002)(7696005)(476003)(256004)(76176011)(478600001)(606006)(99286004); DIR:OUT; SFP:1102; SCL:1; SRVR:TY2PR01MB2089; H:TY2PR01MB2297.jpnprd01.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:0; MX:1; 
received-spf: None (protection.outlook.com: cu.nri.co.jp does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 619FIPocz1KbN6GtQ7H15lEGQE/ExqPO19bzMcIpUwHuUww8xT6rr4m713MUrTRqHYAQUpndqdN+eNZGf1Hh2lLtfee29V8ilXxHuDl/o+d7cadREjd5v5fk/KmxprbKtI4UtK9xe3ogaQmuPmyz3HozuZPV5RbVjNs6XH62T8QANc5G/+9SAcmuAaJpSC+MtyMYTq35C7aiKr9VR5GpBqKHQaFpL7T4C2JPuOVhgHHf7nm34OKU3gfE0O+5IlulwEif5iMrXzjq7TEvYnwyIdETUbqqqxhkDoUnF9hKdU0i7FzJOQM+AXYYs2PxZFlBYBE8hwpMAvcPJ0DlMUruOUZdQ5eQ49DexdoLJhiMXZA=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB229756ABC3B1098A89B11F9DF9510TY2PR01MB2297jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ba6cd4db-9842-460f-f701-08d5ee090755
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 06:21:28.7046 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e3e360d9-7e7f-48d5-ac33-3c5de61f0a75
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY2PR01MB2089
X-OrganizationHeadersPreserved: TY2PR01MB2089.jpnprd01.prod.outlook.com
X-CrossPremisesHeadersPromoted: CUEXE02PA.cu.nri.co.jp
X-CrossPremisesHeadersFiltered: CUEXE02PA.cu.nri.co.jp
X-OriginatorOrg: cu.nri.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/D4zFSY3elZMjjgI9jOl0-hFV0GI>
Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 06:21:41 -0000

--_000_TY2PR01MB229756ABC3B1098A89B11F9DF9510TY2PR01MB2297jpnp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_TY2PR01MB229756ABC3B1098A89B11F9DF9510TY2PR01MB2297jpnp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
V2luZ2RpbmdzOw0KCXBhbm9zZS0xOjUgMCAwIDAgMCAwIDAgMCAwIDA7fQ0KQGZvbnQtZmFjZQ0K
CXtmb250LWZhbWlseToi77yt77yzIOOCtOOCt+ODg+OCryI7DQoJcGFub3NlLTE6MiAxMSA2IDkg
NyAyIDUgOCAyIDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsN
CglwYW5vc2UtMToyIDQgNSAzIDUgNCA2IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1p
bHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OiJcQO+8re+8syDjgrTjgrfjg4Pjgq8iOw0KCXBhbm9zZS0xOjIgMTEg
NiA5IDcgMiA1IDggMiA0O30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwg
bGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowY207DQoJbWFyZ2luLWJvdHRv
bTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNh
bnMtc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3Jp
dHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlz
aXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7
DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29ub3Jt
YWwwLCBsaS5tc29ub3JtYWwwLCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29u
b3JtYWw7DQoJbXNvLW1hcmdpbi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBjbTsNCglt
c28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowY207DQoJZm9udC1zaXpl
OjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLjE4DQoJ
e21zby1zdHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OiJBcmlhbCIsc2Fu
cy1zZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHls
ZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC41cHQ7DQoJZm9udC1mYW1pbHk6IkFy
aWFsIixzYW5zLXNlcmlmO30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzky
LjBwdDsNCgltYXJnaW46OTkuMjVwdCAzLjBjbSAzLjBjbSAzLjBjbTt9DQpkaXYuV29yZFNlY3Rp
b24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNvIDld
Pjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0K
PC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxheW91
dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpz
aGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkVOLVVT
IiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7QXJp
YWwmcXVvdDssc2Fucy1zZXJpZiI+QW5kIGlmIGl0IHdlcmUgbm90IG9idmlvdXMsIFlFUw0KPC9z
cGFuPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpXaW5nZGluZ3MiPko8L3NwYW4+PHNwYW4gc3R5
bGU9ImZvbnQtZmFtaWx5OiZxdW90O0FyaWFsJnF1b3Q7LHNhbnMtc2VyaWYiPjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LWZhbWls
eTomcXVvdDtBcmlhbCZxdW90OyxzYW5zLXNlcmlmIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj5Gcm9tOjwvYj4gT0F1dGggW21haWx0bzpvYXV0
aC1ib3VuY2VzQGlldGYub3JnXSA8Yj5PbiBCZWhhbGYgT2YNCjwvYj5EaWNrIEhhcmR0PGJyPg0K
PGI+U2VudDo8L2I+IEZyaWRheSwgSnVseSAyMCwgMjAxOCA2OjEyIEFNPGJyPg0KPGI+VG86PC9i
PiBSaWZhYXQgU2hla2gtWXVzZWYgJmx0O3JpZmFhdC5pZXRmQGdtYWlsLmNvbSZndDs8YnI+DQo8
Yj5DYzo8L2I+IG9hdXRoICZsdDtvYXV0aEBpZXRmLm9yZyZndDs8YnI+DQo8Yj5TdWJqZWN0Ojwv
Yj4gUmU6IFtPQVVUSC1XR10gQ2FsbCBmb3IgYWRvcHRpb24gZm9yICZxdW90O0Rpc3RyaWJ1dGVk
IE9BdXRoJnF1b3Q7PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZu
YnNwOzwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5JJ20gc3VwcG9ydGl2
ZS4gOik8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIFRo
dSwgSnVsIDE5LCAyMDE4IGF0IDQ6MDUgUE0sIFJpZmFhdCBTaGVraC1ZdXNlZiAmbHQ7PGEgaHJl
Zj0ibWFpbHRvOnJpZmFhdC5pZXRmQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPnJpZmFhdC5p
ZXRmQGdtYWlsLmNvbTwvYT4mZ3Q7IHdyb3RlOjxvOnA+PC9vOnA+PC9wPg0KPGJsb2NrcXVvdGUg
c3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlkICNDQ0NDQ0MgMS4wcHQ7cGFkZGlu
ZzowY20gMGNtIDBjbSA2LjBwdDttYXJnaW4tbGVmdDo0LjhwdDttYXJnaW4tcmlnaHQ6MGNtIj4N
CjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SGkgYWxsLDxvOnA+PC9vOnA+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGlzIGlzIHRoZSBjYWxs
IGZvciBhZG9wdGlvbiBvZiB0aGUgJ0Rpc3RyaWJ1dGVkIE9BdXRoJyBkb2N1bWVudDxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Zm9sbG93aW5nIHRo
ZSBwb3NpdGl2ZSBjYWxsIGZvciBhZG9wdGlvbiBhdCB0aGUgTW9udHJlYWwgSUVURiBtZWV0aW5n
LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5I
ZXJlIGlzIHRoZSBkb2N1bWVudDo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j
L2RyYWZ0LWhhcmR0LW9hdXRoLWRpc3RyaWJ1dGVkLyIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8v
ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWhhcmR0LW9hdXRoLWRpc3RyaWJ1dGVkLzwv
YT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxv
OnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
UGxlYXNlIGxldCB1cyBrbm93IGJ5IEF1Z3VzdCAybmQgd2hldGhlciB5b3UgYWNjZXB0IC8gb2Jq
ZWN0IHRvIHRoZTxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+YWRvcHRpb24gb2YgdGhpcyBkb2N1bWVudCBhcyBhIHN0YXJ0aW5nIHBvaW50IGZvciB3
b3JrIGluIHRoZSBPQXV0aDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+d29ya2luZyBncm91cC48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+UmVnYXJkcyw8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkhhbm5lcyAmYW1wOyBSaWZhYXQ8bzpwPjwvbzpw
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtYXJn
aW4tYm90dG9tOjEyLjBwdCI+PGJyPg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX188YnI+DQpPQXV0aCBtYWlsaW5nIGxpc3Q8YnI+DQo8YSBocmVmPSJtYWls
dG86T0F1dGhAaWV0Zi5vcmciPk9BdXRoQGlldGYub3JnPC9hPjxicj4NCjxhIGhyZWY9Imh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5rIj5o
dHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxvOnA+PC9vOnA+
PC9wPg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZu
YnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_TY2PR01MB229756ABC3B1098A89B11F9DF9510TY2PR01MB2297jpnp_--


From nobody Fri Jul 20 00:29:02 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B549131026 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:28:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 12fYXOUyxsQf for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:28:56 -0700 (PDT)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E7D0130F08 for <oauth@ietf.org>; Fri, 20 Jul 2018 00:28:56 -0700 (PDT)
Received: from [80.187.106.183] (helo=[10.159.162.20]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgPqJ-0004qd-Ia; Fri, 20 Jul 2018 09:28:52 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-8FD162E3-FF8D-4E93-A13C-DF6DB172EC1C; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <TY2PR01MB229756ABC3B1098A89B11F9DF9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
Date: Fri, 20 Jul 2018 09:28:31 +0200
Cc: Dick Hardt <dick.hardt@gmail.com>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <42FCE1EF-1470-4F29-86D4-8DEFCC823452@lodderstedt.net>
References: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com> <CAD9ie-urtSu51s3HD+F7HPVAnR3ViFNwBaKfvXcxs2ht1xKLTw@mail.gmail.com> <TY2PR01MB229756ABC3B1098A89B11F9DF9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
To: n-sakimura <n-sakimura@nri.co.jp>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/6vCDYrCK_DuAPQO_Ko70vlhJ5Vs>
Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 07:29:00 -0000

--Apple-Mail-8FD162E3-FF8D-4E93-A13C-DF6DB172EC1C
Content-Type: multipart/alternative;
	boundary=Apple-Mail-1FE006C3-47D4-43B0-BFF1-E9FAD734CB9C
Content-Transfer-Encoding: 7bit


--Apple-Mail-1FE006C3-47D4-43B0-BFF1-E9FAD734CB9C
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

+1

> Am 20.07.2018 um 08:21 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>=20
> And if it were not obvious, YES J
> =20
> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of Dick Hardt
> Sent: Friday, July 20, 2018 6:12 AM
> To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> Cc: oauth <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
> =20
> I'm supportive. :)
> =20
> On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com=
> wrote:
> Hi all,
> =20
> This is the call for adoption of the 'Distributed OAuth' document
> following the positive call for adoption at the Montreal IETF meeting.
> =20
> Here is the document:
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
> =20
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
> =20
> Regards,
> Hannes & Rifaat
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-1FE006C3-47D4-43B0-BFF1-E9FAD734CB9C
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>+1</div><div><br>Am 20.07.2=
018 um 08:21 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimura@nri.co.jp">=
n-sakimura@nri.co.jp</a>&gt;:<br><br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"=EF=BC=AD=EF=BC=B3 =E3=82=B4=E3=82=B7=E3=83=83=E3=82=AF=
";
	panose-1:2 11 6 9 7 2 5 8 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=EF=BC=AD=EF=BC=B3 =E3=82=B4=E3=82=B7=E3=83=83=E3=82=
=AF";
	panose-1:2 11 6 9 7 2 5 8 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.18
	{mso-style-type:personal-reply;
	font-family:"Arial",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.5pt;
	font-family:"Arial",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:99.25pt 3.0cm 3.0cm 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->


<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if">And if it were not obvious, YES
</span><span style=3D"font-family:Wingdings">J</span><span style=3D"font-fam=
ily:&quot;Arial&quot;,sans-serif"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@i=
etf.org">mailto:oauth-bounces@ietf.org</a>] <b>On Behalf Of
</b>Dick Hardt<br>
<b>Sent:</b> Friday, July 20, 2018 6:12 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">r=
ifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt=
;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">I'm supportive. :)<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Yusef &=
lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt; wrote:<o:p></o:p></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm=
 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal">Hi all,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">This is the call for adoption of the 'Distributed OAu=
th' document<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">following the positive call for adoption at the Montr=
eal IETF meeting.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Here is the document:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://datatracker.ietf.org/doc/draft-har=
dt-oauth-distributed/" target=3D"_blank">https://datatracker.ietf.org/doc/dr=
aft-hardt-oauth-distributed/</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Please let us know by August 2nd whether you accept /=
 object to the<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">adoption of this document as a starting point for wor=
k in the OAuth<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">working group.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes &amp; Rifaat<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-1FE006C3-47D4-43B0-BFF1-E9FAD734CB9C--

--Apple-Mail-8FD162E3-FF8D-4E93-A13C-DF6DB172EC1C
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-8FD162E3-FF8D-4E93-A13C-DF6DB172EC1C--


From nobody Fri Jul 20 00:33:00 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69D42131067 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:32:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mPUOiEvW5TKG for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:32:57 -0700 (PDT)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32B07130E99 for <oauth@ietf.org>; Fri, 20 Jul 2018 00:32:55 -0700 (PDT)
Received: from [80.187.106.183] (helo=[10.159.162.20]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgPuC-0006p4-I6; Fri, 20 Jul 2018 09:32:53 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-9522163F-D372-4BA7-BBDE-314E1079A304; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
Date: Fri, 20 Jul 2018 09:32:17 +0200
Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
To: n-sakimura <n-sakimura@nri.co.jp>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/37dwMzEmR_EoUbV9HPIlDbzAqYE>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 07:32:58 -0000

--Apple-Mail-9522163F-D372-4BA7-BBDE-314E1079A304
Content-Type: multipart/alternative;
	boundary=Apple-Mail-3D7D85C9-E71F-4450-B0CC-2787D69A2DB3
Content-Transfer-Encoding: 7bit


--Apple-Mail-3D7D85C9-E71F-4450-B0CC-2787D69A2DB3
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

I support adoption of this document.

I would like to point out (again) a single resource is not sufficient for mo=
st use cases I implemented in the last couple if years. I=E2=80=98m advocati=
ng for enhancing the draft to support multiple resources and a clear definit=
ion of the relationship between resource(s) and scope.

> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>=20
> +1
> =20
> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of Brian Campbell
> Sent: Friday, July 20, 2018 7:42 AM
> To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> Cc: oauth <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAu=
th 2.0"
> =20
> I support adoption of this document.
> =20
> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com=
> wrote:
> Hi all,
>=20
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0' d=
ocument
> following the positive call for adoption at the Montreal IETF meeting.
>=20
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>=20
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>=20
> Regards,
> Rifaat
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> =20
>=20
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
 material for the sole use of the intended recipient(s). Any review, use, di=
stribution or disclosure by others is strictly prohibited..  If you have rec=
eived this communication in error, please notify the sender immediately by e=
-mail and delete the message and any file attachments from your computer. Th=
ank you.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-3D7D85C9-E71F-4450-B0CC-2787D69A2DB3
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>I support adoption of this d=
ocument.</div><div><br></div><div>I would like to point out (again) a single=
 resource is not sufficient for most use cases I implemented in the last cou=
ple if years. I=E2=80=98m advocating for enhancing the draft to support mult=
iple resources and a clear definition of the relationship between resource(s=
) and scope.</div><div><br>Am 20.07.2018 um 08:20 schrieb n-sakimura &lt;<a h=
ref=3D"mailto:n-sakimura@nri.co.jp">n-sakimura@nri.co.jp</a>&gt;:<br><br></d=
iv><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"=EF=BC=AD=EF=BC=B3 =E3=82=B4=E3=82=B7=E3=83=83=E3=82=AF=
";
	panose-1:2 11 6 9 7 2 5 8 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=EF=BC=AD=EF=BC=B3 =E3=82=B4=E3=82=B7=E3=83=83=E3=82=
=AF";
	panose-1:2 11 6 9 7 2 5 8 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.18
	{mso-style-type:personal-reply;
	font-family:"Arial",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.5pt;
	font-family:"Arial",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:99.25pt 3.0cm 3.0cm 3.0cm;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->


<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if">+1 <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@i=
etf.org">mailto:oauth-bounces@ietf.org</a>] <b>On Behalf Of
</b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">r=
ifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt=
;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for "Resource Indicators fo=
r OAuth 2.0"<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document. <o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef &=
lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt; wrote:<o:p></o:p></p>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm=
 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the 'Resource Indicators for OAuth 2.0' doc=
ument<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource-=
indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#1155=
CC">https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02<=
/span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans-=
serif;color:#555555;border:none windowtext 1.0pt;padding:0cm">CONFIDENTIALIT=
Y NOTICE: This email may contain confidential and privileged material for th=
e sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibite=
d..&nbsp; If you have received this communication in error, please notify th=
e sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</span></i></b><o:p></o:p></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-3D7D85C9-E71F-4450-B0CC-2787D69A2DB3--

--Apple-Mail-9522163F-D372-4BA7-BBDE-314E1079A304
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyMDA3MzIxN1owIwYJKoZIhvcNAQkEMRYE
FHvx1jv8KGQZW22ddOn4EwMx9QzAMIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQASY8l7bLIZNAcxZwCpMakxlqZk/Mj8
ZXUEnzKyvvA8Ko3Y6iTVWfkeve2u4ZYiZn2abruWQriVTPctilBLn1N8o0U/h5o3v0eVgkznErW2
hTGxkSFNGTmL+qiLp3BUx7hlO9txYdZdpVtj3bdRv+l62XqW8jAsVm4t2jM3AtJ3nptl+ATeqUOO
R5zvSfkKdMJ0q5Prsn9t75SkfNo2wPa280z9eLmYJY6xZSIohOpIz1EAvAKyEHUDqJ5LxTEjj8Ee
INQze+It3JJ1VCNKHWCv7RBF8FfvLcAMaZflHMo0MdCWm+BUhBVXHyrUpdLJrxXRjAM04k1+OGk+
C15YKgrTAAAAAAAA
--Apple-Mail-9522163F-D372-4BA7-BBDE-314E1079A304--


From nobody Fri Jul 20 00:43:37 2018
Return-Path: <panva.ip@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B39413107D for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:43:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8iO9wt-i2M3W for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 00:43:32 -0700 (PDT)
Received: from mail-oi0-x229.google.com (mail-oi0-x229.google.com [IPv6:2607:f8b0:4003:c06::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DD32131071 for <oauth@ietf.org>; Fri, 20 Jul 2018 00:43:32 -0700 (PDT)
Received: by mail-oi0-x229.google.com with SMTP id b15-v6so19711750oib.10 for <oauth@ietf.org>; Fri, 20 Jul 2018 00:43:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=W3744Eh21XfcHSVH/VD/hbnVLJLK79Es7BwRGbZANiA=; b=YjMcsH9DKEMd9mMQDMEaRHnPsZARYJJFA2OdNV89pZ/DYklBRzraN5sZw+2gQs+R21 Yi4OTPaSl0nUEIb66ltsHWX1eXHGfEO8ThHWuGyfms7Kn9QaQSOjHVs4Qc8pXo66Mk13 V+ooyBYEY+hudLKG/pIY3tRb/v7IJ2zsDTh2iSl9+jfOsyDFqSrzNyOJXJiUxeVusaQ9 7JbhSCrPzxYeEHVaTSw+kdvFhc/HQY498BqIynEttPQO+Zndo9MkviYokM02rvVifYYH MSknEpfabQ3AgoCel4ONlgI3/AhpP7uaUcMPeShYYDfbMz4xbgMobOj6gJi++/trN7dX 0ZLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=W3744Eh21XfcHSVH/VD/hbnVLJLK79Es7BwRGbZANiA=; b=f4S6v5brRfDO90vmsFOZDMa6MUL8kQGnSy08k8ts33wvZqaYTMYHcCmomcTiHQZBPE GTGBVPOIXjdAF06DEwx09nwa/UraG7L5nJzIJJ+knWG/AumDAP60FUigZMy+2fTeyWNS R2AjsjomFFD03EJLtxYswpONw0hwrCB09YCvTBSctaW/Zec36uBNycjsntm8sijHKbMs B0kxGEeSOyEnSKL1j2KfSedWo7QD2hGpZfherl6eCFR4PaPngbIEUQYZQ/pFtTbdH76z YLW8lsgVU53YkEomu4mk8XuDTIsL3JMwWDXpAIPa7v1Zf/tsS0gx5toeS5/u8xInB+kp kXjA==
X-Gm-Message-State: AOUpUlEKtPLUhknI73+666Wkc3iEMmhBOT48nhucae8h9IsqfRfxNbhT vTWdeXyU0caPW1IA80qJlUTO4XL/V6/4TmXyZg==
X-Google-Smtp-Source: AAOMgpdmvVRWzgG/HIUXcckb7eDb2fB9OWkcxCUSjVESYtQWp6n1sgBc0N/WDB+SKKskxv9Ar1lH9g53FikreNDNn+c=
X-Received: by 2002:aca:eb0d:: with SMTP id j13-v6mr1051702oih.304.1532072611562;  Fri, 20 Jul 2018 00:43:31 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net>
In-Reply-To: <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net>
From: Filip Skokan <panva.ip@gmail.com>
Date: Fri, 20 Jul 2018 09:43:20 +0200
Message-ID: <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000c848d7057169732b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ZftQ5n73g6vpoBwPtMwPpZqiVdc>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 07:43:35 -0000

--000000000000c848d7057169732b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

> Multiple "resource" parameters may be used to indicate that the issued
token is intended to be used at multiple resource servers.

That's already in. Furthermore what about logical names for target
services? Like was added in -03 of token exchange?

Best,
*Filip Skokan*


On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <torsten@lodderstedt.ne=
t>
wrote:

> I support adoption of this document.
>
> I would like to point out (again) a single resource is not sufficient for
> most use cases I implemented in the last couple if years. I=E2=80=98m adv=
ocating
> for enhancing the draft to support multiple resources and a clear
> definition of the relationship between resource(s) and scope.
>
> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>
> +1
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] *O=
n
> Behalf Of *Brian Campbell
> *Sent:* Friday, July 20, 2018 7:42 AM
> *To:* Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> I support adoption of this document.
>
>
>
> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.co=
m>
> wrote:
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.=
.
> If you have received this communication in error, please notify the sende=
r
> immediately by e-mail and delete the message and any file attachments fro=
m
> your computer. Thank you.*
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000000000000c848d7057169732b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi Torsten,</div><div><br></div><div>&gt;=C2=A0Multip=
le &quot;resource&quot; parameters may be used to indicate that the issued =
token is intended to be used at multiple resource servers.</div><div><br></=
div><div>That&#39;s already in. Furthermore what about logical names for ta=
rget services? Like was added in -03 of token exchange?</div><br clear=3D"a=
ll"><div><div dir=3D"ltr" class=3D"gmail_signature">Best,<br><b>Filip Skoka=
n</b></div></div><br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr">=
On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt &lt;<a href=3D"mailto:t=
orsten@lodderstedt.net">torsten@lodderstedt.net</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div dir=3D"auto"><div></div><div>I support ado=
ption of this document.</div><div><br></div><div>I would like to point out =
(again) a single resource is not sufficient for most use cases I implemente=
d in the last couple if years. I=E2=80=98m advocating for enhancing the dra=
ft to support multiple resources and a clear definition of the relationship=
 between resource(s) and scope.</div><div><br>Am 20.07.2018 um 08:20 schrie=
b n-sakimura &lt;<a href=3D"mailto:n-sakimura@nri.co.jp" target=3D"_blank">=
n-sakimura@nri.co.jp</a>&gt;:<br><br></div><blockquote type=3D"cite"><div>






<div class=3D"m_1965793530906637557WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">+1 <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@=
ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a>] <b>On Behalf=
 Of
</b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document. <u></u><u></u><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef =
&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@=
gmail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-=
02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#555555;border:none windowtext 1.0pt;padding:0cm">CONFIDENTIAL=
ITY NOTICE: This email may contain confidential and privileged material for=
 the sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibit=
ed..=C2=A0 If you have received this communication in error, please notify =
the sender immediately by e-mail and delete the message and any file attach=
ments from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
____________________________</span><br><span>OAuth mailing list</span><br><=
span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
</span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></span><br><=
/div></blockquote></div>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div>

--000000000000c848d7057169732b--


From nobody Fri Jul 20 01:33:33 2018
Return-Path: <n-sakimura@nri.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 85A3B130E98 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 01:33:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.789
X-Spam-Level: 
X-Spam-Status: No, score=-1.789 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nri365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qZxzA6trAssc for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 01:33:28 -0700 (PDT)
Received: from nrifs01.index.or.jp (nrigw01.index.or.jp [133.250.250.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DA10131074 for <oauth@ietf.org>; Fri, 20 Jul 2018 01:33:24 -0700 (PDT)
Received: from nrimmfm052.index.or.jp (unknown [172.19.246.144]) by nrifs01.index.or.jp (Postfix) with ESMTP id 44E7A77EF5; Fri, 20 Jul 2018 17:33:24 +0900 (JST)
Received: from index.or.jp (unknown [172.19.246.151]) by nrimmfm052.index.or.jp (Postfix) with ESMTP id DF90D4E0046; Fri, 20 Jul 2018 17:33:23 +0900 (JST)
Received: from nriea04.index.or.jp (localhost.localdomain [127.0.0.1]) by pps.mf051 (8.15.0.59/8.15.0.59) with SMTP id w6K8XNGF030647; Fri, 20 Jul 2018 17:33:23 +0900
Received: from nrims00a.nri.co.jp ([192.50.135.11]) by nriea04.index.or.jp with ESMTP id w6K8XN37030646; Fri, 20 Jul 2018 17:33:23 +0900
Received: from nrims00a.nri.co.jp (localhost.localdomain [127.0.0.1]) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K8XNO8043259; Fri, 20 Jul 2018 17:33:23 +0900
Received: (from mailnull@localhost) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.0/Submit) id w6K8XN8B043256; Fri, 20 Jul 2018 17:33:23 +0900
X-Authentication-Warning: nrims00a.nri.co.jp: mailnull set sender to n-sakimura@nri.co.jp using -f
Received: from nrizmf13.index.or.jp ([172.100.25.22]) by nrims00a.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id w6K8XNZT043252; Fri, 20 Jul 2018 17:33:23 +0900
Received: from CUEXE02PA.cu.nri.co.jp (192.51.23.32) by CUEXM01SA.cu.nri.co.jp (172.59.253.43) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 17:33:22 +0900
Received: from APC01-PU1-obe.outbound.protection.outlook.com (65.55.88.23) by ex.nri.co.jp (192.51.23.33) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 20 Jul 2018 17:33:21 +0900
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nri365.onmicrosoft.com; s=selector1-cu-nri-co-jp; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=K0L/aCZd56GJif8ehop6zKo2omvRi/AQ9oBu3QjypfQ=; b=SzAN+Swk4mPR+kV4tG3Ju7Y4wSZqsJ3K/dP/S246HVlV6YgNdlBoP8lh3OM5M3+oJNVd9BiiWtMEvTQiI6nAD9KE9tuxLKcuCXF8RiQTQOMnFXjPe2nnHP22Eayh6JhCwdu9Y9E5AZdxgj0kbBgnFqS+WRsMnYCgjZOClu83JVQ=
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com (52.133.184.14) by TY2PR01MB3227.jpnprd01.prod.outlook.com (20.177.100.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.20; Fri, 20 Jul 2018 08:33:19 +0000
Received: from TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4]) by TY2PR01MB2297.jpnprd01.prod.outlook.com ([fe80::a80c:6cfe:7925:86f4%2]) with mapi id 15.20.0952.022; Fri, 20 Jul 2018 08:33:19 +0000
From: n-sakimura <n-sakimura@nri.co.jp>
To: David Waite <david@alkaline-solutions.com>, Dick Hardt <dick.hardt@gmail.com>
CC: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] updated Distributed OAuth ID
Thread-Index: AQHUAoOaSSHKxrUFgUqarOSvA9w6jaSWZocAgAGYHwA=
Date: Fri, 20 Jul 2018 08:33:19 +0000
Message-ID: <TY2PR01MB2297DBA5677C67441221DF54F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com>
In-Reply-To: <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-mailadviser: 20170719
authentication-results: spf=none (sender IP is ) smtp.mailfrom=n-sakimura@cu.nri.co.jp; 
x-originating-ip: [133.250.250.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; TY2PR01MB3227; 6:Gzd21+oGyg69KY8HPPa2JXucFq6dlTBvfHdwHctrDuWf7sZFif5otVz3BmCQtkDCU9mmdqOjcOPFUc3P9im1kOiHWXhe4WdjLaK1t4Q/QGONorFhZhyDYcVhZG5E8p3HoYCox7EPfjow4krNHrmtv6Gzt4BHl+utli8zQpHpUm2psNW2b2pOhhbYObyZjtLmStS9bmOlnUGWLyrAU6M9slMP4waxgHOWyprffz8KutIcM4McDFtgAaDZkUibhnArnn+qTtUvUTRGUFLThSi3Es/NA3RRb5fREWW4c97DSS6pfO0UJzJiBxuai7vfMN9IQV/QJkv8hS2VKyOUkKRwBlTIoL5miMmF7n+zrNRuPos1rYDmzhaR4mvwcWwibRSvWnrdD8t7sbHDLyVeW1kXxXkHBkfQtXPaDgK5yUpDrzYXCVmCeJgsdW0coZmkbxyq25HQ09etjeIVjMZnPGnsOA==; 5:5YndP8kQZRatVDOt+LjLfgkruYxKegrxKmcl0e2Kou8IIS5ukI+hKQyT8YAiVhP0wJcqjsb+Fkg4HQUrxgru7r3FZrdL1gNAVU9wMk4jwR/r010f14G25GC3JfRx9y0efHs7szk5yoEzNNrWDCjn7qtV6YvUXDMeNJ6ncyj+7Bk=; 7:+EKFfiyq+pgNLJioCNVBTIal6LvXN/raxC19k0M8sPmGl+A9OxjE0mvYUCxatUxH41Yr3tpBOvZJ1L0hsaWW2TFpvcjxxb8cW93W2k1FTkf99biydwzJs7S/Px/8oLbOuVc/AavSzrzSXs+kTPcmedfzI6viKItakzRjcCOi+qMSm1bB6BTx5oBZBNWxf8Fzz3VjRQgWiUv7oIm02xaccWmNfiYkezsVHhgsln5Qf066SIJqHWAfuX8tiQBqo/We
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 7ae9f7b4-dcbd-4329-82e8-08d5ee1b72a6
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(5600053)(711020)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(2017052603328)(7153060)(7193020); SRVR:TY2PR01MB3227; 
x-ms-traffictypediagnostic: TY2PR01MB3227:
x-microsoft-antispam-prvs: <TY2PR01MB3227DF821C5AA6A4EF2A0447F9510@TY2PR01MB3227.jpnprd01.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(120809045254105)(85827821059158)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231311)(944501410)(52105095)(3002001)(93006095)(93001095)(10201501046)(149027)(150027)(6041310)(20161123564045)(2016111802025)(20161123558120)(20161123560045)(20161123562045)(6043046)(6072148)(201708071742011)(7699016); SRVR:TY2PR01MB3227; BCL:0; PCL:0; RULEID:; SRVR:TY2PR01MB3227; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(396003)(366004)(39840400004)(136003)(376002)(199004)(189003)(51914003)(25786009)(2900100001)(4326008)(2420400007)(8936002)(15650500001)(3846002)(790700001)(6116002)(105586002)(6246003)(81156014)(106356001)(8676002)(81166006)(256004)(11346002)(7736002)(476003)(14444005)(19609705001)(486006)(2906002)(5660300001)(74316002)(10710500007)(39060400002)(53936002)(229853002)(9686003)(6306002)(236005)(5250100002)(6436002)(54896002)(86362001)(99286004)(316002)(55016002)(966005)(33656002)(110136005)(14454004)(66066001)(478600001)(26005)(102836004)(186003)(7696005)(446003)(53546011)(76176011)(6506007)(97736004)(68736007)(7110500001)(9326002)(606006)(74482002); DIR:OUT; SFP:1102; SCL:1; SRVR:TY2PR01MB3227; H:TY2PR01MB2297.jpnprd01.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:0; MX:1; 
received-spf: None (protection.outlook.com: cu.nri.co.jp does not designate permitted sender hosts)
x-microsoft-antispam-message-info: eyWs1qYBXDUkUNWK1iITK2Q092uCkRWvOXI16pfvJ0xl5UYZzQ0UXUmN2eWWn5OEonA8M5blwxWHCrvuWzharv3Z7MjdTErrok+Ft7lW75utvLdE54GJeLADxeCSohi1FC5QT3svmJ8ZWtUsuKI9AmtnHfGowSQQZ6DAagolaViTyrvj/1tdMjuQHEtheF+6DHU6kKPUIOWSP5KLZ0deQ+5asAGdaulW3d5q/+UG+r3MTv6BDniaKpv+NZPoV+pVwO48bpfamVfr54QxtCCqAUzHZWUUKKZN216FkJCxU7DfQk++XqU+5gYk7/YVlLMsPxp194krorkNrv9nzBTIeiq+80HqI9qr9QmLAd9ZYbE=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB2297DBA5677C67441221DF54F9510TY2PR01MB2297jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7ae9f7b4-dcbd-4329-82e8-08d5ee1b72a6
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 08:33:19.7367 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e3e360d9-7e7f-48d5-ac33-3c5de61f0a75
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY2PR01MB3227
X-OrganizationHeadersPreserved: TY2PR01MB3227.jpnprd01.prod.outlook.com
X-CrossPremisesHeadersPromoted: CUEXE02PA.cu.nri.co.jp
X-CrossPremisesHeadersFiltered: CUEXE02PA.cu.nri.co.jp
X-OriginatorOrg: cu.nri.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/LGOi6MfxrCGYn7brM9WfLjAPlK4>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 08:33:32 -0000

--_000_TY2PR01MB2297DBA5677C67441221DF54F9510TY2PR01MB2297jpnp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgRGF2aWQsDQoNClRoYW5rcyBmb3IgdGhlIGNvbW1lbnQsIGFuZCBzb3JyeSBmb3IgdGhlIGRl
bGF5IGluIG15IHJlcGx5Lg0KDQpEb2luZyBpdCB3aXRoIFdlYiBMaW5raW5nIFtSRkM4Mjg4XSAg
aGFzIHNldmVyYWwgYWR2YW50YWdlcy4NCg0KDQogIDEuICBJdCBpcyBzdGFuZGFyZCBiYXNlZCDi
mLogSXQgaXMganVzdCBhIG1hdHRlciBvZiByZWdpc3RlcmluZyBsaW5rIHJlbGF0aW9ucyB0byB0
aGUgSUFOQSBMaW5rIFJlbGF0aW9uIFR5cGUgUmVnaXN0cnksIGFuZCBpdCBpcyBxdWl0ZSB3aWRl
bHkgdXNlZC4NCiAgMi4gIE5vIG9yIHZlcnkgbGl0dGxlIGNvZGluZyBuZWVkZWQ6IE90aGVyIHRo
YW4gYWRkaW5nIHNvbWUgSFRUUCBzZXJ2ZXIgY29uZmlndXJhdGlvbiwgdGhlIHJlc3Qgc3RheXMg
dGhlIHNhbWUgYXMgUkZDNjc1MC4NCiAgMy4gIFN0YW5kYXJkIGludGVyZmFjZTogdGhpcyBraW5k
IG9mIG1ldGFkYXRhIGlzIGFwcGxpY2FibGUgbm90IG9ubHkgZm9yIGxldHRpbmcgdGhlIGNsaWVu
dCBmaW5kIHRoZSBhcHByb3ByaWF0ZSBhdXRob3JpemF0aW9uIHNlcnZlciBidXQgZm9yIG90aGVy
IG1ldGFkYXRhIGFzIHdlbGwuIEFsc28sIG90aGVyIGVuZHBvaW50cyBhcyBsb25nIGFzIGl0IGlz
IHN1cHBvcnRpbmcgdGhlIGRpcmVjdCBjb21tdW5pY2F0aW9uIHdpdGggdGhlIGNsaWVudCwgY2Fu
IHByb3ZpZGUgcmVsZXZhbnQgbWV0YWRhdGEgd2l0aCBpdCB3aXRob3V0IGdvaW5nIHRocm91Z2gg
dGhlIGNsaWVudCBhdXRob3JpemF0aW9uLg0KDQpJIGRpZCBub3QgcXVpdGUgZm9sbG93IHdoeSBD
T1JTIGlzIHJlbGV2YW50IGhlcmUuIFdlIGFyZSBqdXN0IHRhbGtpbmcgYWJvdXQgdGhlIGNsaWVu
dCB0byBzZXJ2ZXIgY29tbXVuaWNhdGlvbiwgYW5kIHRoZXJlIGFyZSBubyBlbWJlZGRlZCByZXNv
dXJjZXMgaW4gdGhlIHJlc3BvbnNlLiBDb3VsZCB5b3Uga2luZGx5IGVsYWJvcmF0ZSBhIGxpdHRs
ZSwgcGxlYXNlPw0KDQpGb3IgdGhlIHNlY29uZCBwb2ludCwgc2luY2UgaXQgd2FzIGRpc2N1c3Nl
ZCBpbiB0aGUgV0cgbWVldGluZyB5ZXN0ZXJkYXksIEkgd2lsbCBkZWZlciB0byB0aGF0IGRpc2N1
c3Npb24uDQoNCkJlc3QsDQoNCk5hdCBTYWtpbXVyYQ0KDQoNCkZyb206IE9BdXRoIFttYWlsdG86
b2F1dGgtYm91bmNlc0BpZXRmLm9yZ10gT24gQmVoYWxmIE9mIERhdmlkIFdhaXRlDQpTZW50OiBU
aHVyc2RheSwgSnVseSAxOSwgMjAxOCA0OjU1IFBNDQpUbzogRGljayBIYXJkdCA8ZGljay5oYXJk
dEBnbWFpbC5jb20+DQpDYzogb2F1dGhAaWV0Zi5vcmcNClN1YmplY3Q6IFJlOiBbT0FVVEgtV0dd
IHVwZGF0ZWQgRGlzdHJpYnV0ZWQgT0F1dGggSUQNCg0KRm91ciBjb21tZW50cy4NCg0KRmlyc3Q6
IFdoYXQgaXMgdGhlIHJhdGlvbmFsZSBmb3IgaW5jbHVkaW5nIHRoZSBwYXJhbWV0ZXJzIGFzIExp
bmsgaGVhZGVycyByYXRoZXIgdGhhbiBwYXJ0IG9mIHRoZSBXV1ctQXV0aGVudGljYXRlIGNoYWxs
ZW5nZSwgZS5nLjoNCg0KV1dXLUF1dGhlbnRpY2F0ZTogQmVhcmVyIHJlYWxtPSJleGFtcGxlX3Jl
YWxtIiwNCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgc2NvcGU9ImV4YW1wbGVfc2NvcGUi
LA0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICBlcnJvcj3igJxpbnZhbGlkX3Rva2VuIiwN
CiAgICByZXNvdXJjZV91cmk9Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tL3Jlc291cmNlIiwNCiAg
ICBvYXV0aF9zZXJ2ZXJfbWV0YWRhdGFfdXJpcz0iaHR0cHM6Ly9hcy5leGFtcGxlLmNvbS8ud2Vs
bC1rbm93bi9vYXV0aC1hdXRob3JpemF0aW9uLXNlcnZlciBodHRwczovL2RpZmZlcmVudC1hcy5l
eGFtcGxlLmNvbS8ud2VsbC1rbm93bi9vYXV0aC1hdXRob3JpemF0aW9uLXNlcnZlciINCg0KTXkg
dW5kZXJzdGFuZGluZyBpcyB0aGF0IHRoZSBSRkM2NzUwIGF1dGgtcGFyYW1zIGFyZSBleHRlbnNp
YmxlIChidXQgbm90IGN1cnJlbnRseSBwYXJ0IG9mIGFueSBtYW5hZ2VkIHJlZ2lzdHJ5LikNCg0K
T25lIHJlYXNvbiB0byBnbyB3aXRoIHRoaXMgdnMgTGluayBoZWFkZXJzIGlzIENPUlMgcG9saWN5
IC0gZXhwb3NpbmcgTGluayBoZWFkZXJzIHRvIGEgcmVtb3RlIGNsaWVudCBtdXN0IGJlIGRvbmUg
YWxsIG9yIG5vdGhpbmcgYXMgcGFydCBvZiB0aGUgQ09SUyBwb2xpY3ksIGFuZCBjYW7igJl0IGJl
IGxpbWl0ZWQgYnkgdGhlIGtpbmQgb2YgbGluay4NCg0KU2Vjb25kOiAocmV0YWluaW5nIGxpbmsg
Zm9ybWF0KSBJcyB0aGVyZSBhIHJlYXNvbiB0aGUgbWV0YWRhdGEgbG9jYXRpb24gaXMgc3BlY2lm
aWVkIHRoZSB3YXkgaXQgaXM/IEl0IHNlZW1zIGxpa2UNCg0KPGh0dHBzOi8vYXMuZXhhbXBsZS5j
b20vLndlbGwta25vd24vb2F1dGgtYXV0aG9yaXphdGlvbi1zZXJ2ZXI+OyByZWw94oCcb2F1dGhf
c2VydmVyX21ldGFkYXRhX3VyaSINCg0Kc2hvdWxkIGJlDQoNCjxodHRwczovL2FzLmV4YW1wbGUu
Y29tPjsgcmVsPeKAnG9hdXRoX2lzc3VlciINCg0KT0F1dGggZGVmaW5lcyB0aGUgbG9jYXRpb24g
b2YgbWV0YWRhdGEgdW5kZXIgdGhlIC53ZWxsLWtub3duIGVuZHBvaW50IGFzIGEgTVVTVC4gQW4g
ZXh0ZW5zaW9uIG9mIE9BdXRoIG1heSBjaG9vc2UgZnJvbSBhdCBsZWFzdCB0aHJlZSBkaWZmZXJl
bnQgbWV0aG9kcyBmb3IgaGFuZGxpbmcgZXh0ZW5zaW9ucyBiZXlvbmQgdGhpczoNCjEuIEFkZCBh
ZGRpdGlvbmFsIGtleXMgdG8gdGhlIG9hdXRoLWF1dGhvcml6YXRpb24tc2VydmVyIG1ldGFkYXRh
DQoyLiBBZGQgYWRkaXRpb25hbCByZXNvdXJjZXMgdG8gLndlbGwta25vd24gZm9yIGNsaWVudHMg
dG8gc3VwcG9ydGluZyB0aGVpciBleHRlbnNpb25zIHRvIGF0dGVtcHQgdG8gcmVzb2x2ZSwgdHJl
YXRpbmcg4oCYcmVndWxhcuKAmSBPQXV0aCBhcyBhIGZhbGxiYWNrLg0KMy4gRGVmaW5lIHRoZWly
IG93biBwYXJhbWV0ZXIsIHN1Y2ggYXMgcmVsPeKAnHNwZWNpYWxhdXRoX2lzc3VlcuKAnSwgcG90
ZW50aWFsbHkgdXNpbmcgYSBkaWZmZXJlbnQgbWVjaGFuaXNtIGZvciBzcGVjaWZ5aW5nIG1ldGFk
YXRhDQoNCkdpdmVuIGFsbCB0aGlzLCBpdCBzZWVtcyBhcHByb3ByaWF0ZSB0byBvbmx5IHN1cHBv
cnQgc3BlY2lmeWluZyBvZiBtZXRhZGF0YS1zdXBwbHlpbmcgaXNzdWVycywgbm90IG1ldGFkYXRh
IHVyaXMuDQoNClRoaXJkOiBJIGhhdmUgZG91YnRzIG9mIHRoZSB1c2VmdWxuZXNzIG9mIHJlc291
cmNlX3VyaSBpbiBwYXJhbGxlbCB0byBib3RoIHRoZSBjbGllbnQgcmVxdWVzdGVkIFVSSSBhbmQg
dGhlIEF1dGhvcml6YXRpb24g4oCccmVhbG3igJ0gcGFyYW1ldGVyLg0KDQpBcyBjdXJyZW50bHkg
ZGVmaW5lZCwgdGhlIGNsaWVudCB3b3VsZCBiZSB0aGUgb25lIGVuZm9yY2luZyAob3IgcG9zc2li
bHkgaWdub3JpbmcpIHN0YXRpYyBwb2xpY3kgYXJvdW5kIHJlc291cmNlIFVSSXMgLSB0aGF0IGEg
cmVzb3VyY2UgVVJJIGlzIGFyYml0cmFyeSBleGNlcHQgaW4gdGhhdCBpdCBtdXN0IG1hdGNoIHRo
ZSBob3N0IChhbmQgc2NoZW1lL3BvcnQ/KSBvZiB0aGUgcmVxdWVzdGVkIFVSSS4gVGhlIGluZm9y
bWF0aW9uIG9uIHRoZSByZXF1ZXN0ZWQgVVJJIGJ5IHRoZSBjbGllbnQgaXMgbm90IHNoYXJlZCBi
ZXR3ZWVuIHRoZSBjbGllbnQgYW5kIEFTIGZvciBpdCB0byBkbyBpdHMgb3duIHBvbGljeSB2ZXJp
ZmljYXRpb24uIEl0IHdvdWxkIHNlZW0gYmV0dGVyIHRvIHNlbmQgdGhlIGNsaWVudCBvcmlnaW4g
dG8gdGhlIEFTIGZvciBpdCB0byBkbyAocG90ZW50aWFsKSBwb2xpY3kgdmVyaWZpY2F0aW9uLCBy
YXRoZXIgdGhhbiByZWx5aW5nIG9uIGNsaWVudHMgdG8gaW1wbGVtZW50IGl0IGZvciB0aGVtIGJh
c2VkIG9uIHN0YXRpYyBzcGVjIHBvbGljeS4NCg0KVGhlIG5hbWUg4oCccmVzb3VyY2UgVVJJ4oCd
IGlzIGFsc28gY29uZnVzaW5nLCBhcyBJIHdvdWxkIGV4cGVjdCBpdCB0byBiZSB0aGUgVVJJIHRo
YXQgd2FzIHJlcXVlc3RlZCBieSB0aGUgY2xpZW50LiBUaGUgcHVycG9zZSBvZiB0aGlzIHBhcmFt
ZXRlciBpcyBhIGJpdCBjb25mdXNpbmcsIGFzIGl0IGlzIG9ubHkgZGVmaW5lZCBhcyDigJxBbiBP
QXV0aCAyLjAgUmVzb3VyY2UgRW5kcG9pbnQgc3BlY2lmaWVkIGluIFtSRkM2NzUwXSBzZWN0aW9u
IDMuMiAtIHdoZXJlIHRoZSB0ZXJtIGRvZXNu4oCZdCBhcHBlYXIgaW4gNjc1MCBhbmQgdGhlcmUg
ZG9lcyBub3QgYXBwZWFyIHRvIGJlIGEgc2VjdGlvbiAzLjIgOy0pDQoNCkl0IHNlZW1zIHRoYXQ6
DQphLiBJZiB0aGUgcmVzb3VyY2VfdXJpIGlzIGEgZGlyZWN0IG1hdGNoIGZvciB0aGUgVVJJIHJl
cXVlc3RlZCBmb3IgdGhlIGNsaWVudCwgaXQgaXMgcmVkdW5kYW50IGFuZCBzaG91bGQgYmUgZHJv
cHBlZA0KICAgIChJZiB0aGUgcmVzb3VyY2UgVVJJIGlzICpub3QqIGEgZGlyZWN0IG1hdGNoIHdp
dGggdGhlIFVSSSBvZiB0aGUgcmVzb3VyY2UgcmVxdWVzdGVkIGJ5IHRoZSBjbGllbnQsIGl0IG1p
Z2h0IG5lZWQgYSBiZXR0ZXIgbmFtZSkuDQpiLiBJZiB0aGUgcmVzb3VyY2UgVVJJIGlzIG1lYW50
IHRvIHByb3ZpZGUgYSBjZXJ0YWluIGFyYml0cmFyeSBncm91cGluZyBmb3IgYXBwbHlpbmcgdG9r
ZW5zIHdpdGhpbiB0aGUgb3JpZ2luIG9mIHRoZSByZXNvdXJjZSBzZXJ2ZXIsIHdoYXQgaXMgaXRz
IHZhbHVlIG92ZXIgdGhlIHByZWV4aXN0aW5nIOKAnCByZWFsbeKAnSBwYXJhbWV0ZXI/DQpjLiBJ
ZiB0aGUgcmVzb3VyY2UgVVJJIGlzIG1lYW50IHRvIHByb3ZpZGUgYSB3YXkgZm9yIGFuIEFTIHRv
IGFsbG93IHJlc291cmNlcyB0byBiZSBpbmRlcGVuZGVudCwgaWRlbnRpZmllZCBlbnRpdGllcyBv
biBhIHNpbmdsZSBvcmlnaW4gLSBJ4oCZbSB1bnN1cmUgaG93IGEgY2xpZW50IHdvdWxkIHVuZGVy
c3RhbmQgaXQgaXMgbWVhbnQgdG8gdHJlYXQgdGhlc2UgcmVzb3VyY2UgVVJJcyBhcyBpbmRlcGVu
ZGVudCBlbnRpdGllcyAoZS5nLiBiZSBzdXJlIG5vdCB0byBzZW5kIGJlYXJlciB0b2tlbnMgbWlu
dGVkIGZvciByZXNvdXJjZSAvZW50aXR5MSB0byAvZW50aXR5Miwgb3IgZm9yIHRoYXQgbWF0dGVy
IHByZXZlbnQgL2VudGl0eTEgZnJvbSByZXF1ZXN0aW5nIHRva2VucyBmb3IgL2VudGl0eTIpLg0K
DQpBZG1pdHRlZGx5IGJhc2VkIG9uIG5vdCBmdWxseSB1bmRlcnN0YW5kaW5nIHRoZSBwdXJwb3Nl
IG9mIHRoaXMgcGFyYW1ldGVyLCBpdCBzZWVtcyB0byBtZSB0aGVyZSBleGlzdHMgYSBzaW1wbGVy
IGZsb3cgd2hpY2ggYmV0dGVyIGxldmVyYWdlcyB0aGUgZXhpc3RpbmcgQXV0aGVudGljYXRpb24g
bWVjaGFuaXNtIG9mIEhUVFAuDQoNCkEgcmVxdWVzdCB3b3VsZCBmYWlsIGR1ZSB0byBhbiBpbnZh
bGlkIG9yIG1pc3NpbmcgdG9rZW4gZm9yIHRoZSByZWFsbSBhdCB0aGUgb3JpZ2luLCBhbmQgYW5k
IHRoZSBjbGllbnQgd291bGQgbWFrZSBhIHJlcXVlc3QgdG8gdGhlIGlzc3VlciBpbmNsdWRpbmcg
dGhlIG9yaWdpbiBvZiB0aGUgcmVxdWVzdGVkIHJlc291cmNlIGFzIGEgcGFyYW1ldGVyLiBBbnkg
b3RoZXIgaW5jbHVkZWQgcGFyYW1ldGVycyBzcGVjaWZpZWQgYnkgdGhlIFdXVy1BdXRoZW50aWNh
dGUgY2hhbGxlbmdlIHVuZGVyc3Rvb2QgYnkgdGhlIGNsaWVudCAoc3VjaCBhcyDigJxzY29wZeKA
nSkgd291bGQgYWxzbyBiZSBhcHBsaWVkIHRvIHRoaXMgcmVxdWVzdC4NCg0KTm9ybWFsIGF1dGhv
cml6YXRpb24gZ3JhbnQgZmxvdyB3b3VsZCB0aGVuIGhhcHBlbiAoYXMgdGhpcyBpcyB0aGUgb25s
eSBncmFudCB0eXBlIHN1cHBvcnRlZCBieSBSRkM2NzUwKS4gT25jZSB0aGUgYWNjZXNzIHRva2Vu
IGlzIGFjcXVpcmVkIGJ5IHRoZSBjbGllbnQsIHRoZSBjbGllbnQgYXNzb2NpYXRlcyB0aGF0IHRv
a2VuIHdpdGggdGhlIOKAnHJlYWxt4oCdIHBhcmFtZXRlciBnaXZlbiBpbiB0aGUgaW5pdGlhbCBj
aGFsbGVuZ2UgYnkgdGhlIHJlc291cmNlIHNlcnZlciBvcmlnaW4uIExpa2V3aXNlLCB0aGUg4oCY
YXVk4oCZIG9mIHRoZSB0b2tlbiBhcyByZXR1cm5lZCBieSBhIHRva2VuIGludHJvc3BlY3Rpb24g
cHJvY2VzcyB3b3VsZCBiZSB0aGUgb3JpZ2luIG9mIHRoZSByZXNvdXJjZSBzZXJ2ZXIuDQoNCkl0
IHNlZW1zIGFueSBtb3JlIGNvbXBsaWNhdGVkIHByb3RlY3RlZCByZXNvdXJjZSBncm91cGluZ3Mg
b24gYSByZXNvdXJjZSBzZXJ2ZXIgd291bGQgbmVlZCBhIGNsaWVudCB0byB1bmRlcnN0YW5kIHRo
ZSBzdHJ1Y3R1cmUgb2YgdGhlIHJlc291cmNlIHNlcnZlciwgYW5kIHRodXMgZmV0Y2ggc29tZSBz
b3J0IG9mIHJlc291cmNlIHNlcnZlciBtZXRhZGF0YS4NCg0KRm91cnRoIGFuZCBmaW5hbGx5OiBJ
cyB0aGUgaW50ZW50aW9uIHRvIGV2ZW50dWFsbHkgcmVjb21tZW5kIHRva2VuIGJpbmRpbmcgaGVy
ZT8gVG9rZW4gYmluZGluZyBhcyBhIHJlcXVpcmVtZW50IGFjcm9zcyBjbGllbnRzLCByZXNvdXJj
ZXMsIGFuZCB0aGUgYXV0aG9yaXphdGlvbiBzZXJ2ZXJzIHdvdWxkIGlzb2xhdGUgdG9rZW5zIHRv
IG9ubHkgYmVpbmcgY29uc3VtZWQgd2l0aGluIGFuIG9yaWdpbi4gVGhpcyB3b3VsZCBhY3R1YWxs
eSBtYWtlIHJlZHVuZGFudC9zdXBwbGVtZW50YWwgdGhlIEFTIGFkZGl0aW9ucyBkZWZpbmVkIHdp
dGhpbiB0aGlzIHNwZWMgKHJlc291cmNlL29yaWdpbiByZXF1ZXN0IHBhcmFtZXRlciwg4oCYYXVk
4oCZIGludHJvc3BlY3Rpb24gcmVzcG9uc2UgbWVtYmVyKQ0KDQotRFcNCg0KDQpPbiBKdW4gMTIs
IDIwMTgsIGF0IDE6MjggUE0sIERpY2sgSGFyZHQgPGRpY2suaGFyZHRAZ21haWwuY29tPG1haWx0
bzpkaWNrLmhhcmR0QGdtYWlsLmNvbT4+IHdyb3RlOg0KDQpIZXkgT0F1dGggV0cNCg0KSSBoYXZl
IHdvcmtlZCB3aXRoIE5hdCBhbmQgQnJpYW4gdG8gbWVyZ2Ugb3VyIGNvbmNlcHRzIGFuZCB0aG9z
ZSBhcmUgY2FwdHVyZWQgaW4gdGhlIHVwZGF0ZWQgZHJhZnQuDQoNCmh0dHBzOi8vZGF0YXRyYWNr
ZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWhhcmR0LW9hdXRoLWRpc3RyaWJ1dGVkLw0KDQpXZSBhcmUg
aG9wZWZ1bCB0aGUgV0cgd2lsbCBhZG9wdCB0aGlzIGRyYWZ0IGFzIGEgV0cgZG9jdW1lbnQuDQoN
CkFueSBjb21tZW50cyBhbmQgZmVlZGJhY2sgYXJlIHdlbGNvbWUhDQoNCi9EaWNrDQpfX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KT0F1dGggbWFpbGluZyBs
aXN0DQpPQXV0aEBpZXRmLm9yZzxtYWlsdG86T0F1dGhAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5p
ZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQoNCg==

--_000_TY2PR01MB2297DBA5677C67441221DF54F9510TY2PR01MB2297jpnp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_TY2PR01MB2297DBA5677C67441221DF54F9510TY2PR01MB2297jpnp_--


From nobody Fri Jul 20 07:07:00 2018
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F987130DE7 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:06:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.02
X-Spam-Level: 
X-Spam-Status: No, score=-0.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id poqQlsqv6hGT for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:06:55 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-bl2nam06on0115.outbound.protection.outlook.com [104.47.53.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5742130DD8 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:06:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jGCoqVNhhhE83hzFFhhfap3uFwTBV/zukBuI/Oh/oT0=; b=eriRoQzC55SuJAvkpJy0XeoaiJ9PaU6aVOlrS6eHvn1yPiuktTCmUe++Yr9R4gRc0bbErwAP0TZM+BEHMrFzF2znybh61X3FNlFTBTe8q0qkCHnO7EPb852/NF5onf0SBt+3sKAn8KCAUZjouk2/iKcgSXur4pctkHeFCzvHOnw=
Received: from DM5PR00MB0389.namprd00.prod.outlook.com (52.132.129.25) by DM5PR00MB0358.namprd00.prod.outlook.com (52.132.128.165) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1014.0; Fri, 20 Jul 2018 14:06:52 +0000
Received: from DM5PR00MB0389.namprd00.prod.outlook.com ([fe80::5d46:7952:6aa0:e10a]) by DM5PR00MB0389.namprd00.prod.outlook.com ([fe80::5d46:7952:6aa0:e10a%3]) with mapi id 15.20.1019.000; Fri, 20 Jul 2018 14:06:52 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
Thread-Index: AQHUH4gZ4YlaG/gRw0eQMEg8QI9R2aSYJicA
Date: Fri, 20 Jul 2018 14:06:52 +0000
Message-ID: <DM5PR00MB03898165B0E24AA4A41610E9A6510@DM5PR00MB0389.namprd00.prod.outlook.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
In-Reply-To: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [31.133.149.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR00MB0358; 6:lOjv2fESWcj+PW1N9wEO+bHNwoaKZ+juKWjTlfH9LB5mEi+xF+Fa/6Twl4IhHiNqS+zXBjFOGAgOa548wdsNBQfGgimM6CdVrjoRiu9UqnwLm/+Vc1prOZWBSqZ08M0GQrjgxeqj0Wr479A1xUMn/G/mbmk7UN3F11Gt+fRF+ytJtF3zyFe/PDQcX1MJ++yZXC7c3vfAQlpThg6pNRmF3UMWOMfaNgkrdii+1TKkbXWBms8D9aZCSXezyn4tk+UJ5Oxg4Oa8dm65GEnw2hKlOBYrrNpaKIBntNqa/QJRIuYXURagTTjyDScCJ4pcrYslRC4ICYYXkJkIdu0wKLzxNq02eYYXeQUOSj5d1TJPwDh4E+5otRlysd5JbQuoxb5FUnAmI8+t2ZoiB4b79+uPknRjPLXvggmqeOOdWDYiCKdGdpCsX9M5VgorR6sttEdP9zUsHMDgol9pgdLwv9SlFQ==; 5:4Q3JssTJuEA0FH3hOvtPPoRQHWcpqyHKiPMc40vV2hgezwbSgyTxgy9g2g2LBAHBBmOqx7rq9NBLGQ7QsaFESEREjdfoWzqRsAH6FfcF4c+ZvzeOsQdVRxhZQ9pRkscBaJr/oU7JcrCGVvTUaocsrVy40WOxlbSaILjYllcxTCU=; 7:t/H1lWXisjEWMVviasRGyHckMNOP1VuJ5KW+u0A3GyyMOFnOCTaXGS2/utJi5oDBbcbQtgZRJcrrqN1caDZ2FccSlcrYHeTy0JhSPo8e78RlvJ3sTJl/288doO2Zj7XvaGanklcYTQPpDIW9YZz/AKwkri+t+XNDXPZHl9mnsp8mfh7xZ9BbmywnRlsZFaVyzC9UB2b2orPawQhcraIK5sPvoNv4+XfRLxGmw+9JegfW8Lzl/hoSGdDPgeaT2Xi5
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: f132ec62-a069-42ce-edb5-08d5ee4a0b33
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:DM5PR00MB0358; 
x-ms-traffictypediagnostic: DM5PR00MB0358:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=tonynad@microsoft.com; 
x-microsoft-antispam-prvs: <DM5PR00MB0358358D6721DCD9A760DBBAA6510@DM5PR00MB0358.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(120809045254105)(192374486261705)(189930954265078)(219752817060721)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(10201501046)(3002001)(93006095)(93001095)(3231311)(944501410)(52105095)(2018427008)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:DM5PR00MB0358; BCL:0; PCL:0; RULEID:; SRVR:DM5PR00MB0358; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(346002)(376002)(396003)(136003)(39860400002)(53754006)(189003)(199004)(9686003)(6306002)(229853002)(486006)(66066001)(478600001)(110136005)(14454004)(966005)(316002)(476003)(606006)(81156014)(8676002)(33656002)(99286004)(10290500003)(22452003)(81166006)(8936002)(2906002)(76176011)(10090500001)(11346002)(8990500004)(14444005)(54896002)(256004)(25786009)(2900100001)(86362001)(26005)(186003)(6246003)(7696005)(68736007)(53546011)(6506007)(790700001)(236005)(6436002)(55016002)(6116002)(19609705001)(3846002)(39060400002)(106356001)(446003)(105586002)(7736002)(86612001)(97736004)(5660300001)(5250100002)(74316002)(102836004)(53936002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR00MB0358; H:DM5PR00MB0389.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: azChls5IthFeTr34yjDo97KJyKtHww3WXPdWauHxJCrfGsjlj2Q6Lzq/mKuf+GOQrapvDlQgLl9EmUoF1iO0fSbT/rIBEuBJtVX/UDjazMq2YsyHh6ipDB8J93sG8FWqEODm4XF870dMxFiKLC70lnxqQJiiyntLYLvctiGG8TpFR/E0eXU0vujSuckyHZwB0IzwL7w/rnb6Q0ka4vCc6nPoLlRE3mHPptrqACS9N2EkT3wTt5IR7wndFAdovnRn1CdVPn1LyeOYQmErSRMr+vUe+/2fxEuPVpiN5iirj3ehaxuHMLmfIibvWxkWBb3YlWv+W5iI33VTseWm4A3S3cnb3EIM0yuEIAExBoK0KQM=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DM5PR00MB03898165B0E24AA4A41610E9A6510DM5PR00MB0389namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f132ec62-a069-42ce-edb5-08d5ee4a0b33
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 14:06:52.4215 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR00MB0358
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/dFH3SkXO7qFJl0PnKMVwW856MUM>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:06:58 -0000

--_000_DM5PR00MB03898165B0E24AA4A41610E9A6510DM5PR00MB0389namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR00MB03898165B0E24AA4A41610E9A6510DM5PR00MB0389namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM5PR00MB03898165B0E24AA4A41610E9A6510DM5PR00MB0389namp_--


From nobody Fri Jul 20 07:14:28 2018
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19723130DCE for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:14:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H4iOIRv4FUeG for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:14:22 -0700 (PDT)
Received: from mail-it0-x22c.google.com (mail-it0-x22c.google.com [IPv6:2607:f8b0:4001:c0b::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 123FA129619 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:14:21 -0700 (PDT)
Received: by mail-it0-x22c.google.com with SMTP id h2-v6so14896393itj.1 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:14:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=message-id:mime-version:to:from:subject:date:importance:in-reply-to :references; bh=fc+jV0ld7lC193Zz4R5whh2iRf3S7ksGHUVZzt99yyE=; b=t5JQ31M03OndgcVTXyAcmYSWWuISltGBUI18OidhAO00t263rRLYNptc0P+Ll96qaP G7ljMQhWft/nBuJzFJ0q0UoNlMcNd5Nk94uoS0qWvpKFNypVfcJZW4/u5kjnlm/5zRQw JZjuIdtKpnDUPDstLp6h5O4xz5j3BGQ1xVFH/UVTouGlaiYL2InYNjxKQshHJ0JIWQrN j6au+6m/29Ec+qvyR9kme0a3vY6Ww1PU5GoYIrBaTJxWMWie4xNTOt39033TAwMOG1Nq YHm0ivK5t90OqM+Bs9nLR75uugLFDPHYOr1IP+0fZw5KHd5j9LCgaEgPf0ZPxd5R6rCl 7DIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:mime-version:to:from:subject:date :importance:in-reply-to:references; bh=fc+jV0ld7lC193Zz4R5whh2iRf3S7ksGHUVZzt99yyE=; b=A+NOuzL+kFR3BakOrr/3BnLnADArQ41kmVcXu2y0nYicGvr811F9+DuFldwV9NZJMi E2LXFw7HKBtdvUMuUd3E6+viMAecx7hREcJl4FIa5Vdo5ayE9aZQ1UyBYljB9pD/W1Ej cgweI8mYRMviD4HdvBURh2CGv81JwsvhxIHLkCmPFlbRX4anxZa/bqDBAC6hKncnSdqg xajFLmq9CbVrC9YECNIw9gN9ypAs99Qj/PMhwpdXP5z4SPRFSw8lCSXBx4HnHdhyF1HS R+QEuECQjlMrt/fDIYrUupSp3BTYubFDqeU9pCezOnhKguHpOdZZJV78QM8W2gZggN6W 8K5g==
X-Gm-Message-State: AOUpUlF8Kgli3cam32rn/rkWLwcIeaQEWtWkZFmz3iCUCkx85dq2WBxh vfQVIlSLeY+7m41smqK+LW4lwQ==
X-Google-Smtp-Source: AAOMgpfhmDS4h963NFH9RKTuiX7BNBEcmYlwQBZwwVyRMA66NNv/tN7/VQPgEpbwElz8mMIV6Jv+TA==
X-Received: by 2002:a02:ab97:: with SMTP id t23-v6mr1944515jan.17.1532096060969;  Fri, 20 Jul 2018 07:14:20 -0700 (PDT)
Received: from ?IPv6:2001:67c:370:128:bc3a:605c:eed5:5b4d? ([2001:67c:370:128:bc3a:605c:eed5:5b4d]) by smtp.gmail.com with ESMTPSA id 186-v6sm774854ioo.17.2018.07.20.07.14.19 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 Jul 2018 07:14:19 -0700 (PDT)
Message-ID: <5b51ee3b.1c69fb81.b1ede.474b@mx.google.com>
MIME-Version: 1.0
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
From: John Bradley <ve7jtb@ve7jtb.com>
Date: Fri, 20 Jul 2018 10:14:17 -0400
Importance: normal
X-Priority: 3
In-Reply-To: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="_470CE9AF-51FB-4D33-8F3E-7F91A6B7C6F6_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/uZujGaSdmMJJl2kiGwYExC9ziMA>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth TokenIntrospection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:14:24 -0000

--_470CE9AF-51FB-4D33-8F3E-7F91A6B7C6F6_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

I am in favor of adoption.


Sent from Mail for Windows 10

From: Rifaat Shekh-Yusef
Sent: Thursday, July 19, 2018 1:44 PM
To: oauth
Subject: [OAUTH-WG] Call for adoption of "JWT Response for OAuth TokenIntro=
spection"

Hi all,

This is the call for adoption of the 'JWT Response for OAuth Token Introspe=
ction' document following the presentation by Torsten at the Montreal IETF =
meeting where we didn't have a chance to do a call for adoption in the meet=
ing itself.

Here is presentation by Torsten:
https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-j=
wt-response-for-oauth-token-introspection-00

Here is the document:
https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-respo=
nse-01

Please let us know by August 2nd whether you accept / object to the adoptio=
n of this document as a starting point for work in the OAuth working group.

Regards,
Hannes & Rifaat


--_470CE9AF-51FB-4D33-8F3E-7F91A6B7C6F6_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta ht=
tp-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta name=
=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style></head><body lang=3DEN-US link=3Dblue vlink=3D"#954F72"><div cla=
ss=3DWordSection1><p class=3DMsoNormal>I am in favor of adoption.</p><p cla=
ss=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p><=
/p><p class=3DMsoNormal>Sent from <a href=3D"https://go.microsoft.com/fwlin=
k/?LinkId=3D550986">Mail</a> for Windows 10</p><p class=3DMsoNormal><o:p>&n=
bsp;</o:p></p><div style=3D'mso-element:para-border-div;border:none;border-=
top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal sty=
le=3D'border:none;padding:0in'><b>From: </b><a href=3D"mailto:rifaat.ietf@g=
mail.com">Rifaat Shekh-Yusef</a><br><b>Sent: </b>Thursday, July 19, 2018 1:=
44 PM<br><b>To: </b><a href=3D"mailto:oauth@ietf.org">oauth</a><br><b>Subje=
ct: </b>[OAUTH-WG] Call for adoption of &quot;JWT Response for OAuth TokenI=
ntrospection&quot;</p></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div>=
<div><p class=3DMsoNormal>Hi all,</p></div><div><p class=3DMsoNormal><o:p>&=
nbsp;</o:p></p></div><div><p class=3DMsoNormal>This is the call for adoptio=
n of the 'JWT Response for OAuth Token Introspection' document following th=
e presentation by Torsten at the Montreal IETF meeting where we didn't have=
 a chance to do a call for adoption in the meeting itself.</p></div><div><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Her=
e is presentation by Torsten:</p></div><div><p class=3DMsoNormal><a href=3D=
"https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-=
jwt-response-for-oauth-token-introspection-00">https://datatracker.ietf.org=
/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth-token-=
introspection-00</a></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></=
p></div><div><p class=3DMsoNormal>Here is the document:</p></div><div><p cl=
ass=3DMsoNormal><a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oa=
uth-jwt-introspection-response-01">https://tools.ietf.org/html/draft-lodder=
stedt-oauth-jwt-introspection-response-01</a></p></div><div><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Please let us kn=
ow by August 2nd whether you accept / object to the adoption of this docume=
nt as a starting point for work in the OAuth working group.</p></div><div><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Re=
gards,</p></div></div><p class=3DMsoNormal>Hannes &amp; Rifaat</p><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>=

--_470CE9AF-51FB-4D33-8F3E-7F91A6B7C6F6_--


From nobody Fri Jul 20 07:16:33 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E19C130E0F for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:16:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.08
X-Spam-Level: 
X-Spam-Status: No, score=0.08 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6R3UIfFAjOa8 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:16:16 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10084.outbound.protection.outlook.com [40.107.1.84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F5C31311C8 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:16:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4j0Q1AZk92Nbvq+J/yxfVeXPOQTqAI49sBfS5tuyiJU=; b=T9QigJlq4uKGBGks02riQdhI/c50hVIrkokwub18yPof365vvVdo22oZJsaogwgDTmorksvHMaqEdxlTKXXG0JnwujZl0fzRwXRqDSqK6EPIRBNRmrS1j0pycAqs2Hof/N4rHdDHMO7FcKL+WpqVyjiJrXsgXrDIgQAyFZVxMoY=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1278.eurprd08.prod.outlook.com (10.167.197.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.16; Fri, 20 Jul 2018 14:16:00 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Fri, 20 Jul 2018 14:16:00 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Anthony Nadalin <tonynad=40microsoft.com@dmarc.ietf.org>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
Thread-Index: AQHUH4gXdJvYc5Qzg0SLBaEcvWfZcaSYJsAAgAACFGA=
Date: Fri, 20 Jul 2018 14:15:59 +0000
Message-ID: <VI1PR0801MB2112D9BE45C4F852CEAF0E4FFA510@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <DM5PR00MB03898165B0E24AA4A41610E9A6510@DM5PR00MB0389.namprd00.prod.outlook.com>
In-Reply-To: <DM5PR00MB03898165B0E24AA4A41610E9A6510@DM5PR00MB0389.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1278; 6:kxiTYJuRD2NHEOLBda8Ewivl4mWUiMzm/urkyMdS/k7/XDECziHs6t0hzwKuM1RO9FKjs4kRqDyPEL+HIJxMX1z7EhO4hl3/yEhcsWXxaJi1F00S+/h55iJ1usDNmLXxMV+wwzlL4yNBb5ryHm5v4HlCU64a9iLJO/0ifyGi02xiqa4ePXir0ZdQ7yt9lB7NRbWlQvBw9GxgJOTHfi0pIV5QIAslTxcd2kSmugARokIDlduWw1Lu1cefdTBlbuuBd6AOOMqx6Nsz5/+YF0HkiZlB6Z8kHMKw4YL67yTzGrDa57LYGtoPyhHXk12jCSuIzDlOhK+SDa2x+Cxp2ChrtlO+sIaOskBTG3GHTIGw0pi94NJ41kBkSFZQEnPVaxvR06ZNMWu8k7Ye4ojY66JDJxl0f35DARauOkkCuv4YAKRhHw6olq6cOIPE19HRYEN5qUIC+mkTmTu/z2lTnTacew==; 5:Gf74uPQHVOsLWZn6XmBJMtg5g5ubLWMby+DlwaaghJfqxaLDcokgST3DGoaQStrde0M/NYddWhtnw1EmHJ3YnMgJcLu08Dhfyu1LPQ7sTNouhGgd5uxuPWDvPga7eO+pf24aaPw7FEsMx70q9l0Bz8bUXY05SQNRxX3Uf1/GoNo=; 7:qnClT6E7ZwwXR2vaT5wVR5VW2cB2G1gqB9Svm413vEQ2e36R+FOYXmdMp0FS8Ez+7ZuL3Iu81ofUxLyImNnLNXXiJLyQRpLUto4H1+0WntphpRi5sSQreDBA++tRR5D0TzvBhphoPGIIZPNdGf/9fCqBKjeHgysr0QpZ3X5vMc9R+4Hz6J25SjogahT4h0YexALZ4jwQhNCobRG8k/l7e3k4BBmEom+k4zIvRu4kbSPmYf7BdKTMqvhXQxIKoGG1
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 6e203d82-f21d-4574-626f-08d5ee4b5189
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1278; 
x-ms-traffictypediagnostic: VI1PR0801MB1278:
x-microsoft-antispam-prvs: <VI1PR0801MB127800597A785080A35097A8FA510@VI1PR0801MB1278.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(120809045254105)(192374486261705)(189930954265078)(223705240517415)(219752817060721)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231311)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123560045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1278; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1278; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(136003)(396003)(376002)(346002)(53754006)(199004)(40434004)(189003)(86362001)(3846002)(6506007)(14444005)(11346002)(55016002)(76176011)(6436002)(446003)(5024004)(14454004)(54896002)(186003)(476003)(74316002)(7736002)(6116002)(966005)(9686003)(229853002)(6306002)(26005)(236005)(53546011)(256004)(102836004)(68736007)(72206003)(790700001)(81156014)(81166006)(606006)(5660300001)(97736004)(316002)(8936002)(478600001)(33656002)(6246003)(25786009)(99286004)(39060400002)(7696005)(2900100001)(486006)(2906002)(105586002)(66066001)(106356001)(110136005)(8676002)(53936002)(5250100002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1278; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Vbm0u2qDwF+mDeAxVgUnml1kd6X8aP4aYS2U+Q/+8HbO6yduBWduZamJdxAuIBFo4W0ixfQ3TZvbRND1uXBWLM1mFyMRrZ0szCiR9Vkybv0UpmlWusoW9tJWFynvCqyhmGkiUzlL9ndB2d/+ywLYXo94sYLSW9jyDCmElhtI135oZmFBP30fr1JsfU1OatiKYJ2u11IqwYwerX1uPlrSi3k8rtuFM5PgH48DpS2L65emG4RPQzca+/GpVDjWTnkz4wTG7514KkllYWrdybOrQG1wFrQ5TUA5iWbfWRjonWerBBFoNZDEQC97iN6pOwhtZwPnLLtHla92/oSqn0/b60qZCUE5OcFatg5Ak/A2qN4=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2112D9BE45C4F852CEAF0E4FFA510VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e203d82-f21d-4574-626f-08d5ee4b5189
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 14:15:59.9227 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1278
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/XJKnGlQNFMhZcI9oxx7gcJ7zdNs>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:16:31 -0000

--_000_VI1PR0801MB2112D9BE45C4F852CEAF0E4FFA510VI1PR0801MB2112_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB2112D9BE45C4F852CEAF0E4FFA510VI1PR0801MB2112_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTQgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJ
e2ZvbnQtZmFtaWx5OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQov
KiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1z
b05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNp
emU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0KYTpsaW5r
LCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1
ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBl
cmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0K
CXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29ub3JtYWwwLCBsaS5tc29ub3JtYWww
LCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29ub3JtYWw7DQoJbXNvLW1hcmdp
bi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBjbTsNCgltc28tbWFyZ2luLWJvdHRvbS1h
bHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowY207DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZh
bWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO30NCnNwYW4uRW1haWxTdHlsZTE4DQoJe21zby1z
dHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7
DQoJY29sb3I6d2luZG93dGV4dDt9DQpzcGFuLkVtYWlsU3R5bGUxOQ0KCXttc28tc3R5bGUtdHlw
ZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiOw0K
CWNvbG9yOiMxRjQ5N0Q7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5cGU6ZXhwb3J0
LW9ubHk7DQoJZm9udC1zaXplOjEwLjBwdDt9DQpAcGFnZSBXb3JkU2VjdGlvbjENCgl7c2l6ZTo2
MTIuMHB0IDc5Mi4wcHQ7DQoJbWFyZ2luOjcyLjBwdCA3Mi4wcHQgNzIuMHB0IDcyLjBwdDt9DQpk
aXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtp
ZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4
PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8
bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0i
MSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwvaGVhZD4NCjxib2R5
IGxhbmc9IkVOLUdCIiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xhc3M9Ildv
cmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iY29sb3I6IzFG
NDk3RCI+VGhlcmUgYXJlIGNvbXBhbmllcyBkb2luZyB0b2tlbiBpbnRyb3NwZWN0aW9uIGJ5IHRo
ZSBjbGllbnQgYWxyZWFkeSwgc2VlDQo8YSBocmVmPSJodHRwczovL2JhY2tzdGFnZS5mb3JnZXJv
Y2suY29tL2RvY3MvYW0vNi9vYXV0aDItZ3VpZGUvI3NlYy1zdGFuZGFyZHMiPmh0dHBzOi8vYmFj
a3N0YWdlLmZvcmdlcm9jay5jb20vZG9jcy9hbS82L29hdXRoMi1ndWlkZS8jc2VjLXN0YW5kYXJk
czwvYT48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBz
dHlsZT0iY29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImNvbG9yOiMxRjQ5N0QiPldoYXQgc2VjdXJpdHkg
aW1wbGljYXRpb25zIGRvIHlvdSBzZWU/DQo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48YSBuYW1lPSJfTWFpbEVuZENvbXBvc2UiPjxzcGFuIHN0eWxlPSJjb2xv
cjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L2E+PC9wPg0KPGRpdj4NCjxkaXYg
c3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5n
OjMuMHB0IDBjbSAwY20gMGNtIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+RnJvbTo8L3NwYW4+PC9iPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtUYWhvbWEm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90OyI+IE9BdXRoIFttYWlsdG86b2F1dGgtYm91bmNl
c0BpZXRmLm9yZ10NCjxiPk9uIEJlaGFsZiBPZiA8L2I+QW50aG9ueSBOYWRhbGluPGJyPg0KPGI+
U2VudDo8L2I+IDIwIEp1bHkgMjAxOCAxMDowNzxicj4NCjxiPlRvOjwvYj4gUmlmYWF0IFNoZWto
LVl1c2VmOyBvYXV0aDxicj4NCjxiPlN1YmplY3Q6PC9iPiBSZTogW09BVVRILVdHXSBDYWxsIGZv
ciBhZG9wdGlvbiBvZiAmcXVvdDtKV1QgUmVzcG9uc2UgZm9yIE9BdXRoIFRva2VuIEludHJvc3Bl
Y3Rpb24mcXVvdDs8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBsYW5nPSJFTi1VUyI+SeKAmW0gY29uY2VybmVkIG92ZXIgdGhlIHNlY3VyaXR5IGlt
cGxpY2F0aW9ucyBvZiBhIGNsaWVudCBiZWluZyBhYmxlIHRvIGludHJvc3BlY3QgYSB0b2tlbiwg
Zm9yIGJlYXJlciB0b2tlbnMgdGhpcyBjYW4gYmUgdmVyeSBwcm9ibGVtYXRpYywgc28gdW5sZXNz
IHRoZSBpc3N1ZXMgd2l0aCBwb3NzaWJsZSB0b2tlbiB0aGVmdCBjYW4gYmUgYWRkcmVzc2VkIEkg
ZG9u4oCZdCBzdXBwb3J0DQogdGhpcyBhcyBhIFdHIGRyYWZ0PG86cD48L286cD48L3NwYW4+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIGxhbmc9IkVOLVVT
Ij5Gcm9tOjwvc3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4tVVMiPiBPQXV0aCAmbHQ7b2F1dGgtYm91
bmNlc0BpZXRmLm9yZyZndDsNCjxiPk9uIEJlaGFsZiBPZiA8L2I+UmlmYWF0IFNoZWtoLVl1c2Vm
PGJyPg0KPGI+U2VudDo8L2I+IFRodXJzZGF5LCBKdWx5IDE5LCAyMDE4IDEwOjQ0IEFNPGJyPg0K
PGI+VG86PC9iPiBvYXV0aCAmbHQ7b2F1dGhAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDo8
L2I+IFtPQVVUSC1XR10gQ2FsbCBmb3IgYWRvcHRpb24gb2YgJnF1b3Q7SldUIFJlc3BvbnNlIGZv
ciBPQXV0aCBUb2tlbiBJbnRyb3NwZWN0aW9uJnF1b3Q7PG86cD48L286cD48L3NwYW4+PC9wPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+
PC9zcGFuPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFu
Zz0iRU4tVVMiPkhpIGFsbCw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFu
Zz0iRU4tVVMiPlRoaXMgaXMgdGhlIGNhbGwgZm9yIGFkb3B0aW9uIG9mIHRoZSAnSldUIFJlc3Bv
bnNlIGZvciBPQXV0aCBUb2tlbiBJbnRyb3NwZWN0aW9uJyBkb2N1bWVudCBmb2xsb3dpbmcgdGhl
IHByZXNlbnRhdGlvbiBieSBUb3JzdGVuIGF0IHRoZSBNb250cmVhbCBJRVRGIG1lZXRpbmcgd2hl
cmUgd2UgZGlkbid0IGhhdmUgYSBjaGFuY2UgdG8gZG8gYSBjYWxsIGZvciBhZG9wdGlvbiBpbg0K
IHRoZSBtZWV0aW5nIGl0c2VsZi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286
cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
bGFuZz0iRU4tVVMiPkhlcmUgaXMgcHJlc2VudGF0aW9uIGJ5IFRvcnN0ZW46PG86cD48L286cD48
L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFu
Zz0iRU4tVVMiPjxhIGhyZWY9Imh0dHBzOi8vbmEwMS5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRs
b29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZGF0YXRyYWNrZXIuaWV0Zi5vcmclMkZtZWV0aW5n
JTJGMTAyJTJGbWF0ZXJpYWxzJTJGc2xpZGVzLTEwMi1vYXV0aC1zZXNzYS1qd3QtcmVzcG9uc2Ut
Zm9yLW9hdXRoLXRva2VuLWludHJvc3BlY3Rpb24tMDAmYW1wO2RhdGE9MDIlN0MwMSU3Q3Rvbnlu
YWQlNDBtaWNyb3NvZnQuY29tJTdDNWJiNGQxMjYxODk0NGNjOGRhNGIwOGQ1ZWQ5ZjM4NmIlN0M3
MmY5ODhiZjg2ZjE0MWFmOTFhYjJkN2NkMDExZGI0NyU3QzElN0MwJTdDNjM2Njc2MTkwNDc4MDc5
MzY4JmFtcDtzZGF0YT13djhlJTJGdkdEbTlMemVKYUdyT0JEOG9HWGdQU3F1TkUlMkJSS2lFa25G
OHNxNCUzRCZhbXA7cmVzZXJ2ZWQ9MCI+aHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9tZWV0
aW5nLzEwMi9tYXRlcmlhbHMvc2xpZGVzLTEwMi1vYXV0aC1zZXNzYS1qd3QtcmVzcG9uc2UtZm9y
LW9hdXRoLXRva2VuLWludHJvc3BlY3Rpb24tMDA8L2E+PG86cD48L286cD48L3NwYW4+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxv
OnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5IZXJlIGlzIHRoZSBkb2N1bWVudDo8bzpwPjwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBs
YW5nPSJFTi1VUyI+PGEgaHJlZj0iaHR0cHM6Ly9uYTAxLnNhZmVsaW5rcy5wcm90ZWN0aW9uLm91
dGxvb2suY29tLz91cmw9aHR0cHMlM0ElMkYlMkZ0b29scy5pZXRmLm9yZyUyRmh0bWwlMkZkcmFm
dC1sb2RkZXJzdGVkdC1vYXV0aC1qd3QtaW50cm9zcGVjdGlvbi1yZXNwb25zZS0wMSZhbXA7ZGF0
YT0wMiU3QzAxJTdDdG9ueW5hZCU0MG1pY3Jvc29mdC5jb20lN0M1YmI0ZDEyNjE4OTQ0Y2M4ZGE0
YjA4ZDVlZDlmMzg2YiU3QzcyZjk4OGJmODZmMTQxYWY5MWFiMmQ3Y2QwMTFkYjQ3JTdDMSU3QzAl
N0M2MzY2NzYxOTA0NzgwNzkzNjgmYW1wO3NkYXRhPWNGSVNPVm1hOGclMkJYZHZmMktaZHdDWkJZ
bHBmTiUyRkdiMmtudjhaRDlzS3o0JTNEJmFtcDtyZXNlcnZlZD0wIj5odHRwczovL3Rvb2xzLmll
dGYub3JnL2h0bWwvZHJhZnQtbG9kZGVyc3RlZHQtb2F1dGgtand0LWludHJvc3BlY3Rpb24tcmVz
cG9uc2UtMDE8L2E+PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIj5QbGVhc2UgbGV0IHVzIGtub3cgYnkgQXVndXN0IDJuZCB3aGV0aGVyIHlvdSBhY2NlcHQg
LyBvYmplY3QgdG8gdGhlIGFkb3B0aW9uIG9mIHRoaXMgZG9jdW1lbnQgYXMgYSBzdGFydGluZyBw
b2ludCBmb3Igd29yayBpbiB0aGUgT0F1dGggd29ya2luZyBncm91cC48bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJF
Ti1VUyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPlJlZ2FyZHMsPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiPkhhbm5lcyAmYW1wOyBSaWZhYXQ8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjwvZGl2Pg0KPC9kaXY+DQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVudHMgb2YgdGhpcyBl
bWFpbCBhbmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5kIG1heSBhbHNvIGJl
IHByaXZpbGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNpcGllbnQsIHBsZWFz
ZSBub3RpZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRpc2Nsb3NlIHRoZSBj
b250ZW50cyB0byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBwdXJwb3NlLA0KIG9y
IHN0b3JlIG9yIGNvcHkgdGhlIGluZm9ybWF0aW9uIGluIGFueSBtZWRpdW0uIFRoYW5rIHlvdS4N
CjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_VI1PR0801MB2112D9BE45C4F852CEAF0E4FFA510VI1PR0801MB2112_--


From nobody Fri Jul 20 07:18:47 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3078B130DE7 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:18:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DUTBFs73wx0Z for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:18:43 -0700 (PDT)
Received: from mail-it0-x22a.google.com (mail-it0-x22a.google.com [IPv6:2607:f8b0:4001:c0b::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B5DB126BED for <oauth@ietf.org>; Fri, 20 Jul 2018 07:18:43 -0700 (PDT)
Received: by mail-it0-x22a.google.com with SMTP id s7-v6so14860840itb.4 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:18:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=wHyT8MBPYD3WIDk/LSq/Aa43Xz4Gg9SPFIYjkgOiJfA=; b=NRSDrWzMjzbdt1a8P1tG92F1F4lruGqd2tHIRFQUEjNwxYWUSJwHMgZYeQ47/Z7A4n 5p4sqDcjucCgfPacpJqcJqOz+XML23i8589KGhMBZI8N0TW+5kJOdw6m35ymwLnxQcnJ Yua9gjbSNVh2LbKNj89E7fv0INvYwrL+jHhG8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=wHyT8MBPYD3WIDk/LSq/Aa43Xz4Gg9SPFIYjkgOiJfA=; b=s7bIxpovynNpo1WyYpHDT0kqVr5dIf9nJM7SzQgh86uJzzEcZZ4tr0CVN+tqhCham7 7a5PzG8RjSvmaZaLkt7f+c60hRNtn91ms01ACPZZ3lY61S6ZtqugalRofiEM5tnl3HPf McvxiaQqNL3/SnBqSFAl7OwWQnQTHi2gRfAWcsaDCuDESvHpTAhKssyWCd6q303Dda7b ZZDmmhveFeQRv/53HkhwW1htauR07g0YojsdIlJbGpnWUJU6mgTOB9V5qwzHm3D5qUon QRlGMR09WeODIFL0seYxeCkBTwQnR/QxywJFq+I7iLqZs2nT1XkAbcQP1QL6SC16UkwH /q9Q==
X-Gm-Message-State: AOUpUlEVCschLgMrpkSC+phXlQVenLmHZy8xP/GiVB7/GYwfCPga3+Zj qTXQ682iAOp/9mUeh99WGEHDlT93EITdDrwGDG5QeVhC+xvgODW8/nlEtUPY1zlsH/LZeOdVF0f dtqiPGh4NIsPeVQ==
X-Google-Smtp-Source: AAOMgpf6vebsyljn2F9baCHh2kHkryh/nLTx5aq7+u2WwrOCRljERsiUvgbNXgq2Sq//GKUEyYGpWOLrfrkzGNjy6Ms=
X-Received: by 2002:a02:3407:: with SMTP id x7-v6mr2023395jae.110.1532096322443;  Fri, 20 Jul 2018 07:18:42 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Fri, 20 Jul 2018 07:18:11 -0700 (PDT)
In-Reply-To: <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 20 Jul 2018 10:18:11 -0400
Message-ID: <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com>
To: Filip Skokan <panva.ip@gmail.com>
Cc: Torsten Lodderstedt <torsten@lodderstedt.net>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000fbe8b05716ef9fe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/HnyKpbK-4GRqNMsLCkxleDSuxIk>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:18:46 -0000

--0000000000000fbe8b05716ef9fe
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

The current draft does allow multiple "resource" parameters. However, there
seemed to be consensus in the WG meeting yesterday that only a single
"resource" parameter was preferable and that a client could obtain an
access token per resource (likely using a refresh token). I'm personally
sympathetic to that point. But maybe it's too restrictive. I would like to
see some more text about the complexity implications of multiple "resource"
parameters and perhaps some discouragement of doing so. I believe logical
names are more potentially useful in an STS framework like token exchange
but should be out of scope for this work.







On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan <panva.ip@gmail.com> wrote:

> Hi Torsten,
>
> > Multiple "resource" parameters may be used to indicate that the issued
> token is intended to be used at multiple resource servers.
>
> That's already in. Furthermore what about logical names for target
> services? Like was added in -03 of token exchange?
>
> Best,
> *Filip Skokan*
>
>
> On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
>> I support adoption of this document.
>>
>> I would like to point out (again) a single resource is not sufficient fo=
r
>> most use cases I implemented in the last couple if years. I=E2=80=98m ad=
vocating
>> for enhancing the draft to support multiple resources and a clear
>> definition of the relationship between resource(s) and scope.
>>
>> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>>
>> +1
>>
>>
>>
>> *From:* OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] *=
On
>> Behalf Of *Brian Campbell
>> *Sent:* Friday, July 20, 2018 7:42 AM
>> *To:* Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
>> *Cc:* oauth <oauth@ietf.org>
>> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
>> OAuth 2.0"
>>
>>
>>
>> I support adoption of this document.
>>
>>
>>
>> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <
>> rifaat.ietf@gmail.com> wrote:
>>
>> Hi all,
>>
>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
>> document
>> following the positive call for adoption at the Montreal IETF meeting.
>>
>> Here is the document:
>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>
>> Please let us know by August 2nd whether you accept / object to the
>> adoption of this document as a starting point for work in the OAuth
>> working group.
>>
>> Regards,
>> Rifaat
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>> privileged material for the sole use of the intended recipient(s). Any
>> review, use, distribution or disclosure by others is strictly prohibited=
..
>> If you have received this communication in error, please notify the send=
er
>> immediately by e-mail and delete the message and any file attachments fr=
om
>> your computer. Thank you.*
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--0000000000000fbe8b05716ef9fe
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>The current draft does allow multiple &quot;resource&=
quot; parameters. However, there seemed to be consensus in the WG meeting y=
esterday that only a single &quot;resource&quot; parameter was preferable a=
nd that a client could obtain an access token per resource (likely using a =
refresh token). I&#39;m personally sympathetic to that point. But maybe it&=
#39;s too restrictive. I would like to see some more text about the complex=
ity implications of multiple &quot;resource&quot; parameters and perhaps so=
me discouragement of doing so. I believe logical names are more potentially=
 useful in an STS framework like token=C2=A0exchange but should be out of s=
cope for this work. =C2=A0 <br></div><div><br></div><div><br></div><div><br=
></div><div><br></div><div><br></div><div><br></div></div><div class=3D"gma=
il_extra"><br><div class=3D"gmail_quote">On Fri, Jul 20, 2018 at 3:43 AM, F=
ilip Skokan <span dir=3D"ltr">&lt;<a href=3D"mailto:panva.ip@gmail.com" tar=
get=3D"_blank">panva.ip@gmail.com</a>&gt;</span> wrote:<br><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div dir=3D"ltr"><div>Hi Torsten,</div><div><br></div><div>&=
gt;=C2=A0Multiple &quot;resource&quot; parameters may be used to indicate t=
hat the issued token is intended to be used at multiple resource servers.</=
div><div><br></div><div>That&#39;s already in. Furthermore what about logic=
al names for target services? Like was added in -03 of token exchange?</div=
><br clear=3D"all"><div><div dir=3D"ltr" class=3D"m_477017653891901618gmail=
_signature">Best,<br><b>Filip Skokan</b></div></div><br></div><div class=3D=
"HOEnZb"><div class=3D"h5"><br><div class=3D"gmail_quote"><div dir=3D"ltr">=
On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt &lt;<a href=3D"mailto:t=
orsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt; w=
rote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><div></div>=
<div>I support adoption of this document.</div><div><br></div><div>I would =
like to point out (again) a single resource is not sufficient for most use =
cases I implemented in the last couple if years. I=E2=80=98m advocating for=
 enhancing the draft to support multiple resources and a clear definition o=
f the relationship between resource(s) and scope.</div><div><br>Am 20.07.20=
18 um 08:20 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimura@nri.co.jp" =
target=3D"_blank">n-sakimura@nri.co.jp</a>&gt;:<br><br></div><blockquote ty=
pe=3D"cite"><div>






<div class=3D"m_477017653891901618m_1965793530906637557WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">+1 <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@=
ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>] <b>On B=
ehalf Of
</b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document. <u></u><u></u><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef =
&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@=
gmail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/<wbr>draft-campbell-oauth-resource-<wbr>i=
ndicators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#555555;border:none windowtext 1.0pt;padding:0cm">CONFIDENTIAL=
ITY NOTICE: This email may contain confidential and privileged material for=
 the sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibit=
ed..=C2=A0 If you have received this communication in error, please notify =
the sender immediately by e-mail and delete the message and any file attach=
ments from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
___________<wbr>_________________</span><br><span>OAuth mailing list</span>=
<br><span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.or=
g</a></span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a></=
span><br></div></blockquote></div>______________________________<wbr>______=
___________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
</blockquote></div>
</div></div><br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--0000000000000fbe8b05716ef9fe--


From nobody Fri Jul 20 07:20:19 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F9B130DE7 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:20:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.629
X-Spam-Level: 
X-Spam-Status: No, score=-0.629 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2xsmQh-YIfaA for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:20:14 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9057130DCE for <oauth@ietf.org>; Fri, 20 Jul 2018 07:20:13 -0700 (PDT)
Received: from [80.187.105.187] (helo=[10.20.204.47]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgWGQ-00015a-0z; Fri, 20 Jul 2018 16:20:10 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-152BF982-4FB9-4AD8-A4AF-D23D2CCFBB67; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <DM5PR00MB03898165B0E24AA4A41610E9A6510@DM5PR00MB0389.namprd00.prod.outlook.com>
Date: Fri, 20 Jul 2018 16:20:09 +0200
Cc: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <DF03AC66-3A2F-4B9A-B58E-A5B89E8A611A@lodderstedt.net>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <DM5PR00MB03898165B0E24AA4A41610E9A6510@DM5PR00MB0389.namprd00.prod.outlook.com>
To: Anthony Nadalin <tonynad=40microsoft.com@dmarc.ietf.org>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/vnYUphMVJs9QjenMTGFInRIn8_4>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:20:18 -0000

--Apple-Mail-152BF982-4FB9-4AD8-A4AF-D23D2CCFBB67
Content-Type: multipart/alternative;
	boundary=Apple-Mail-5FECF17D-E4E3-4EB2-9891-31A6A2DF3E4D
Content-Transfer-Encoding: 7bit


--Apple-Mail-5FECF17D-E4E3-4EB2-9891-31A6A2DF3E4D
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> Am 20.07.2018 um 16:06 schrieb Anthony Nadalin <tonynad=3D40microsoft.com@=
dmarc.ietf.org>:
>=20
> I=E2=80=99m concerned over the security implications of a client being abl=
e to introspect a token, for bearer tokens this can be very problematic, so u=
nless the issues with possible token theft can be addressed I don=E2=80=99t s=
upport this as a WG draft

Hi Tony,

I think this an issue for introspection in general and not specific to our e=
xtension.

If the token content needs to be kept confidential then the AS MUST authenti=
cate the caller of the Introspection endpoint and apply an suitable authz po=
licy. This is possible with Token Introspection and with our draft as well.=20=


Additionally, our draft allows to encrypt the token response, adding an extr=
a layer of defense.=20

kind regards,
Torsten.

> =20
> From: OAuth <oauth-bounces@ietf.org> On Behalf Of Rifaat Shekh-Yusef
> Sent: Thursday, July 19, 2018 10:44 AM
> To: oauth <oauth@ietf.org>
> Subject: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Int=
rospection"
> =20
> Hi all,
> =20
> This is the call for adoption of the 'JWT Response for OAuth Token Introsp=
ection' document following the presentation by Torsten at the Montreal IETF m=
eeting where we didn't have a chance to do a call for adoption in the meetin=
g itself.
> =20
> Here is presentation by Torsten:
> https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-=
jwt-response-for-oauth-token-introspection-00
> =20
> Here is the document:
> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-resp=
onse-01
> =20
> Please let us know by August 2nd whether you accept / object to the adopti=
on of this document as a starting point for work in the OAuth working group.=

> =20
> Regards,
> Hannes & Rifaat
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-5FECF17D-E4E3-4EB2-9891-31A6A2DF3E4D
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div><br></div><div>Am 20.07.201=
8 um 16:06 schrieb Anthony Nadalin &lt;<a href=3D"mailto:tonynad=3D40microso=
ft.com@dmarc.ietf.org">tonynad=3D40microsoft.com@dmarc.ietf.org</a>&gt;:<br>=
<br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->


<div class=3D"WordSection1">
<p class=3D"MsoNormal">I=E2=80=99m concerned over the security implications o=
f a client being able to introspect a token, for bearer tokens this can be v=
ery problematic, so unless the issues with possible token theft can be addre=
ssed I don=E2=80=99t support this as a WG draft</p></div></div></blockquote>=
<div><br></div>Hi Tony,<div><br></div><div>I think this an issue for introsp=
ection in general and not specific to our extension.</div><div><br></div><di=
v>If the token content needs to be kept confidential then the AS MUST authen=
ticate the caller of the Introspection endpoint and apply an suitable authz p=
olicy. This is possible with Token Introspection and with our draft as well.=
&nbsp;</div><div><br></div><div>Additionally, our draft allows to encrypt th=
e token response, adding an extra layer of defense.&nbsp;</div><div><br></di=
v><div>kind regards,</div><div>Torsten.</div><div><br><blockquote type=3D"ci=
te"><div><div class=3D"WordSection1"><p class=3D"MsoNormal"><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounce=
s@ietf.org">oauth-bounces@ietf.org</a>&gt; <b>On Behalf Of </b>
Rifaat Shekh-Yusef<br>
<b>Sent:</b> Thursday, July 19, 2018 10:44 AM<br>
<b>To:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt=
;<br>
<b>Subject:</b> [OAUTH-WG] Call for adoption of "JWT Response for OAuth Toke=
n Introspection"<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">Hi all,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">This is the call for adoption of the 'JWT Response fo=
r OAuth Token Introspection' document following the presentation by Torsten a=
t the Montreal IETF meeting where we didn't have a chance to do a call for a=
doption in the meeting itself.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Here is presentation by Torsten:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://na01.safelinks.protection.outlook.=
com/?url=3Dhttps%3A%2F%2Fdatatracker.ietf.org%2Fmeeting%2F102%2Fmaterials%2Fs=
lides-102-oauth-sessa-jwt-response-for-oauth-token-introspection-00&amp;data=
=3D02%7C01%7Ctonynad%40microsoft.com%7C5bb4d12618944cc8da4b08d5ed9f386b%7C72=
f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636676190478079368&amp;sdata=3Dwv8e=
%2FvGDm9LzeJaGrOBD8oGXgPSquNE%2BRKiEknF8sq4%3D&amp;reserved=3D0">https://dat=
atracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-=
for-oauth-token-introspection-00</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Here is the document:<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://na01.safelinks.protection.outlook.=
com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-lodderstedt-oauth-jwt=
-introspection-response-01&amp;data=3D02%7C01%7Ctonynad%40microsoft.com%7C5b=
b4d12618944cc8da4b08d5ed9f386b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C=
636676190478079368&amp;sdata=3DcFISOVma8g%2BXdvf2KZdwCZBYlpfN%2FGb2knv8ZD9sK=
z4%3D&amp;reserved=3D0">https://tools.ietf.org/html/draft-lodderstedt-oauth-=
jwt-introspection-response-01</a><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Please let us know by August 2nd whether you accept /=
 object to the adoption of this document as a starting point for work in the=
 OAuth working group.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes &amp; Rifaat<o:p></o:p></p>
</div>
</div>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></div></body></html>=

--Apple-Mail-5FECF17D-E4E3-4EB2-9891-31A6A2DF3E4D--

--Apple-Mail-152BF982-4FB9-4AD8-A4AF-D23D2CCFBB67
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyMDE0MjAwOVowIwYJKoZIhvcNAQkEMRYE
FDLKjAUAk/mjgLbJxlzOXRFTrVcVMIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQB0hPOVQjqzeIo/k/v2rv28+K9r0AAg
iv7tqkWEkN1xLVAIihCYh2K7zdoDS4bOIPVOvnjw9xXZW9vGlT56ybnx0ZIusR72ge7z3cR4wuO2
CBoVkiuidld4helj5qhQKLOtXSr/tTJZB41UmedXmBAf45Yap1U0eVJejK2NZ0g1vMVpa8jiBjp6
/OcsGPgIJLxaOSutIZcGtwxIQhJozL8N8A7kvQzxvSPQX1jjlE5Ok4s+rGCq05wJJkF5CPHyS0/J
rY/0XZUpEhG+IrdlrcfsAdQBQKLleP2XCofSNLe5QG+jf1t28wjbdP7upOyBnptdFqWRQcIZ28Ud
6O/JIR/2AAAAAAAA
--Apple-Mail-152BF982-4FB9-4AD8-A4AF-D23D2CCFBB67--


From nobody Fri Jul 20 07:22:19 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAA51131195 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:22:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xpbBZ8fRtMw6 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:22:09 -0700 (PDT)
Received: from mail-io0-x232.google.com (mail-io0-x232.google.com [IPv6:2607:f8b0:4001:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A05B130E3B for <oauth@ietf.org>; Fri, 20 Jul 2018 07:22:09 -0700 (PDT)
Received: by mail-io0-x232.google.com with SMTP id y10-v6so10068052ioa.10 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:22:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=WOEgNcOtgiCvRdk6uSJru5PZ1IEEYoS03sm/w2lYk+E=; b=hveD+GOO0UPsuyacdTH5TzPz6VCp1YzFwy9PMvGwyR3PG1pcC0REw9o3Cbnx9SNZLB EnLKrZBBQESgHH99t3y7g5gEwgI/bhjkPy3dd9Hs/UIxfdH8r9q+Y4BDvFTg3Spoh5QC Q91G20Ozn/T/lGTxzOi+OPidRRkPr5fnhTJhI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=WOEgNcOtgiCvRdk6uSJru5PZ1IEEYoS03sm/w2lYk+E=; b=ICBBFIAc+8k0CgqqI4fEDvNgvZIzoENIL7H/uLRDvB0U/NOzIWSwoQ9Rx4FcVqu4MB QwMfvm9GJm9eLNnyl4unKJ1WpqlF2Q3OPLe+3g4mxI+tWYpWlbB4rN3rXSad1c0kxA8K SNEXX+ffqPQM0BTgxYk82A2ZJ4TdvKtmMIqOBGTmFi6tEy+zQUix89nxzTKNf6brOyDX kF09Vl4rFWxKG2SyEB6v6cUVKoQLF9Y65vCw38Ny9okuLroNGCtXlzUckyg8Zy9Gow+x pQX+iSx4ZsrZmq0iHtTqZVAVFdLre/VxlV7XAZVahltTBc/dvLFqYk+ftOBihFOdaueb Mv4w==
X-Gm-Message-State: AOUpUlG1WcdOSXIs2aFpIRpslh9HBqttNpWYiGaTknEmDQVrjIr8btzh FfRrjnM1+K4pQRguChBc8pyv6Nq7DgDYbld8mlKAZlzjKF1Prh85PBCGe6q4Ymm4adrTyCO8+S3 aGG/dIFH2H+nCgA==
X-Google-Smtp-Source: AAOMgpfziIUTYLBzJ5W+LuiUIJ7FZLLTbdsw6mK1yxw21rrX3HOQT0tlzd/bFgsg9hOrdzeslqXYBb+ZCfDtR7EXdo8=
X-Received: by 2002:a6b:d90d:: with SMTP id r13-v6mr1844314ioc.247.1532096528432;  Fri, 20 Jul 2018 07:22:08 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Fri, 20 Jul 2018 07:21:37 -0700 (PDT)
In-Reply-To: <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 20 Jul 2018 10:21:37 -0400
Message-ID: <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com>
To: William Denniss <wdenniss=40google.com@dmarc.ietf.org>
Cc: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000056dea105716f0546"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Z28fdJNT7koiVjGGMpVi8Al2bdE>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:22:18 -0000

--00000000000056dea105716f0546
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

+1

On Thu, Jul 19, 2018 at 1:51 PM, William Denniss <
wdenniss=3D40google.com@dmarc.ietf.org> wrote:

> I support adoption of this document by the working group.
>
>
> On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <
> rifaat.ietf@gmail.com> wrote:
>
>> Hi all,
>>
>> This is the call for adoption of the 'JWT Response for OAuth Token
>> Introspection' document following the presentation by Torsten at the
>> Montreal IETF meeting where we didn't have a chance to do a call for
>> adoption in the meeting itself.
>>
>> Here is presentation by Torsten:
>> https://datatracker.ietf.org/meeting/102/materials/slides-10
>> 2-oauth-sessa-jwt-response-for-oauth-token-introspection-00
>>
>> Here is the document:
>> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-intr
>> ospection-response-01
>>
>> Please let us know by August 2nd whether you accept / object to the
>> adoption of this document as a starting point for work in the OAuth work=
ing
>> group.
>>
>> Regards,
>> Hannes & Rifaat
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--00000000000056dea105716f0546
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1 <br><div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Thu, Jul 19, 2018 at 1:51 PM, William Denniss <span dir=3D"ltr">&=
lt;<a href=3D"mailto:wdenniss=3D40google.com@dmarc.ietf.org" target=3D"_bla=
nk">wdenniss=3D40google.com@dmarc.ietf.org</a>&gt;</span> wrote:<br><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex"><div dir=3D"ltr">I support adoption of this documen=
t by the working group.<br><div><br></div></div><div class=3D"gmail_extra">=
<br><div class=3D"gmail_quote"><div><div class=3D"h5">On Thu, Jul 19, 2018 =
at 10:43 AM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=3D"mailto:rif=
aat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</span> =
wrote:<br></div></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class=3D"h5"=
><div dir=3D"ltr"><div>Hi all,</div><div><br></div><div>This is the call fo=
r adoption of the &#39;JWT Response for OAuth Token Introspection&#39; docu=
ment following the presentation by Torsten at the Montreal IETF meeting whe=
re we didn&#39;t have a chance to do a call for adoption in the meeting its=
elf.</div><div><br></div><div>Here is presentation by Torsten:</div><div><a=
 href=3D"https://datatracker.ietf.org/meeting/102/materials/slides-102-oaut=
h-sessa-jwt-response-for-oauth-token-introspection-00" target=3D"_blank">ht=
tps://datatracker.ietf.org/m<wbr>eeting/102/materials/slides-10<wbr>2-oauth=
-sessa-jwt-response-for<wbr>-oauth-token-introspection-00</a></div><div><br=
></div><div>Here is the document:</div><div><a href=3D"https://tools.ietf.o=
rg/html/draft-lodderstedt-oauth-jwt-introspection-response-01" target=3D"_b=
lank">https://tools.ietf.org/html/dr<wbr>aft-lodderstedt-oauth-jwt-intr<wbr=
>ospection-response-01</a></div><div><br></div><div>Please let us know by A=
ugust 2nd whether you accept / object to the adoption of this document as a=
 starting point for work in the OAuth working group.</div><div><br></div><d=
iv>Regards,</div><div>Hannes &amp; Rifaat</div></div>
<br></div></div>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
<br></blockquote></div><br></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--00000000000056dea105716f0546--


From nobody Fri Jul 20 07:25:51 2018
Return-Path: <robertotto@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D645130E3B for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:25:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level: 
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pb20-HYBK3nl for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:25:46 -0700 (PDT)
Received: from mail-pl0-x22e.google.com (mail-pl0-x22e.google.com [IPv6:2607:f8b0:400e:c01::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B6EF4130E2E for <oauth@ietf.org>; Fri, 20 Jul 2018 07:25:46 -0700 (PDT)
Received: by mail-pl0-x22e.google.com with SMTP id b1-v6so5270214pls.5 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:25:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=LTYtssZQ2uWGUbzbRQotCVW51cm9xiV8IUeZmsGD50E=; b=alam9bU3xaMoC2kADDVK7TSZDYBmJgWUPUdXng3oOJ02qe3IgbK0kOtYhl8Cys3Plt 0FJU5rTOtLQFgSJunRBwqvdVVamey4WwFQ/sNUtLnlniI9ZtBSS7cWFAhz6HviHsRTho o513pQFey7PzehGMirhrzoMtZ0laVPwfN7oT0=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=LTYtssZQ2uWGUbzbRQotCVW51cm9xiV8IUeZmsGD50E=; b=hDsF2DyxvwrEX+8MdEq8Y79B/dZBzrw7TjQgAoB/2EWjwei9O5uN8oUHwhbKUC+p15 agBgP+gfJ6kkGVBHI4fm7F5XEWqlxjyctCAtZInfLj3laWSL1bBEO9meNm1KUg7ezE+k oQGksrTVezQeRMOs0epVkrIJegREKKJtlW4Sw3BgzutskOlPV1EGiZueVitYjzjU3oT8 FpUetqAjaClhQEKg6YZcox+4hY2bqAbRN2nkCx4bQRZGPbISq0P6u7l+2TV6f3gz7iSe 85CJwYboC+LG3yExz4LTV78lJV7SFiNvvRousBLjYAxKIpOUMrrzBsVXZka1QqXSiRb9 RRXA==
X-Gm-Message-State: AOUpUlHZJQadUk5JedN6Yc1WZyd2LdtkcSXV0G5L+9smjCDCNcni4b1T fND6jtK9JFM8pd0Zbiw42wXnmGaIkwvvOt4bxU9ZxtwWjFysI11csR9fF1ACt124oDYd3G94HD9 GL65c5amy1tnrUfht
X-Google-Smtp-Source: AAOMgpe2RdiG2r61bfinAKXgaAdOJ4VBA8306kCZ97lJxoOudIYKOFQK9sV97QQpi5egFFIuMq6nzVWGnL+78iIFmhc=
X-Received: by 2002:a17:902:20e9:: with SMTP id v38-v6mr2328867plg.107.1532096746069;  Fri, 20 Jul 2018 07:25:46 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com> <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com>
In-Reply-To: <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com>
From: Rob Otto <robotto@pingidentity.com>
Date: Fri, 20 Jul 2018 15:25:35 +0100
Message-ID: <CABh6VRHkwY-AUVmGPU3VM76a5p8--Gn=iCRmAzsKn-DcghXaLw@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004fb3d105716f1265"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/osDuwbMzHG6orVBsTHA_jby84Dg>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:25:50 -0000

--0000000000004fb3d105716f1265
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I support this as well

On Fri, 20 Jul 2018 at 15:22, Brian Campbell <bcampbell=3D
40pingidentity.com@dmarc.ietf.org> wrote:

> +1
>
> On Thu, Jul 19, 2018 at 1:51 PM, William Denniss <
> wdenniss=3D40google.com@dmarc.ietf.org> wrote:
>
>> I support adoption of this document by the working group.
>>
>>
>> On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <
>> rifaat.ietf@gmail.com> wrote:
>>
>>> Hi all,
>>>
>>> This is the call for adoption of the 'JWT Response for OAuth Token
>>> Introspection' document following the presentation by Torsten at the
>>> Montreal IETF meeting where we didn't have a chance to do a call for
>>> adoption in the meeting itself.
>>>
>>> Here is presentation by Torsten:
>>>
>>> https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-ses=
sa-jwt-response-for-oauth-token-introspection-00
>>>
>>> Here is the document:
>>>
>>> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-r=
esponse-01
>>>
>>> Please let us know by August 2nd whether you accept / object to the
>>> adoption of this document as a starting point for work in the OAuth wor=
king
>>> group.
>>>
>>> Regards,
>>> Hannes & Rifaat
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.=
.
> If you have received this communication in error, please notify the sende=
r
> immediately by e-mail and delete the message and any file attachments fro=
m
> your computer. Thank you.*_______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


--=20
<https://www.pingidentity.com>[image: Ping Identity]
<https://www.pingidentity.com>
Rob Otto
EMEA Field CTO/Solutions Architect
robertotto@pingidentity.com

c: +44 (0) 777 135 6092
Connect with us: [image: Glassdoor logo]
<https://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907.11=
,24.htm>
[image:
LinkedIn logo] <https://www.linkedin.com/company/21870> [image: twitter
logo] <https://twitter.com/pingidentity> [image: facebook logo]
<https://www.facebook.com/pingidentitypage> [image: youtube logo]
<https://www.youtube.com/user/PingIdentityTV> [image: Google+ logo]
<https://plus.google.com/u/0/114266977739397708540> [image: Blog logo]
<https://www.pingidentity.com/en/blog.html>
<https://www.gartner.com/doc/reprints?id=3D1-5423XKW&ct=3D180620&st=3Dsb>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--0000000000004fb3d105716f1265
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif;color:#0b5394">I support this as well=C2=A0</div></div><br><div c=
lass=3D"gmail_quote"><div dir=3D"ltr">On Fri, 20 Jul 2018 at 15:22, Brian C=
ampbell &lt;bcampbell=3D<a href=3D"mailto:40pingidentity.com@dmarc.ietf.org=
">40pingidentity.com@dmarc.ietf.org</a>&gt; wrote:<br></div><blockquote cla=
ss=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><div dir=3D"ltr">+1 <br><div class=3D"gmail_extra"><br><div=
 class=3D"gmail_quote">On Thu, Jul 19, 2018 at 1:51 PM, William Denniss <sp=
an dir=3D"ltr">&lt;<a href=3D"mailto:wdenniss=3D40google.com@dmarc.ietf.org=
" target=3D"_blank">wdenniss=3D40google.com@dmarc.ietf.org</a>&gt;</span> w=
rote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">I support adoption=
 of this document by the working group.<br><div><br></div></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote"><div><div class=3D"m_-44489=
80108152642778h5">On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <spa=
n dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank=
">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<br></div></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex"><div><div class=3D"m_-4448980108152642778h5"><div dir=3D"l=
tr"><div>Hi all,</div><div><br></div><div>This is the call for adoption of =
the &#39;JWT Response for OAuth Token Introspection&#39; document following=
 the presentation by Torsten at the Montreal IETF meeting where we didn&#39=
;t have a chance to do a call for adoption in the meeting itself.</div><div=
><br></div><div>Here is presentation by Torsten:</div><div><a href=3D"https=
://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-re=
sponse-for-oauth-token-introspection-00" target=3D"_blank">https://datatrac=
ker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-=
oauth-token-introspection-00</a></div><div><br></div><div>Here is the docum=
ent:</div><div><a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oau=
th-jwt-introspection-response-01" target=3D"_blank">https://tools.ietf.org/=
html/draft-lodderstedt-oauth-jwt-introspection-response-01</a></div><div><b=
r></div><div>Please let us know by August 2nd whether you accept / object t=
o the adoption of this document as a starting point for work in the OAuth w=
orking group.</div><div><br></div><div>Regards,</div><div>Hannes &amp; Rifa=
at</div></div>
<br></div></div>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
..=C2=A0 If you have received this communication in error, please notify th=
e sender immediately by e-mail and delete the message and any file attachme=
nts from your computer. Thank you.</font></span></i>_______________________=
________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div style=3D=
"padding:0px;margin:0">    <table style=3D"border-collapse:collapse;padding=
:0;margin:0">			<tbody><tr>				<td style=3D"width:113px">					<a href=3D"ht=
tps://www.pingidentity.com" target=3D"_blank"></a><a href=3D"https://www.pi=
ngidentity.com" target=3D"_blank"><img alt=3D"Ping Identity" src=3D"https:/=
/www.pingidentity.com/content/dam/pic/images/misc/signature/ping-logo.png">=
</a>				</td>				<td>					<table>												<tbody><tr>			        <td styl=
e=3D"vertical-align:top">				        <span style=3D"color:#e61d3c;display:i=
nline-block;margin-bottom:3px;font-family:arial,helvetica,sans-serif;font-w=
eight:bold;font-size:14px">Rob Otto</span>								<br>								<span style=
=3D"color:#000000;display:inline-block;margin-bottom:2px;font-family:arial,=
helvetica,sans-serif;font-weight:normal;font-size:14px">EMEA Field CTO/Solu=
tions Architect</span>								<br>								<span style=3D"font-family:arial,=
helvetica,sans-serif;font-size:14px;display:inline-block;margin-bottom:3px"=
><a href=3D"mailto:robertotto@pingidentity.com" target=3D"_blank">robertott=
o@pingidentity.com</a></span>								<br>								<span style=3D"color:#0000=
00;display:inline-block;margin-bottom:2px;font-family:arial,helvetica,sans-=
serif;font-weight:normal;font-size:14px">								</span>								<br>							=
	<span style=3D"color:#000000;display:inline-block;margin-bottom:2px;font-f=
amily:arial,helvetica,sans-serif;font-weight:normal;font-size:14px">							=
	c: +44 (0) 777 135 6092</span>							</td>			      </tr>					</tbody></tab=
le>				</td>			</tr>			<tr>				        <td colspan=3D"2">          <table s=
tyle=3D"border-collapse:collapse;border:none;margin:8px 0 0 0;width:100%"> =
         	<tbody><tr style=3D"height:40px;border-top:1px solid #d3d3d3;bord=
er-bottom:1px solid #d3d3d3">              <td style=3D"font-family:arial,h=
elvetica,sans-serif;font-size:14px;font-weight:bold;color:#40474b">Connect =
with us: </td>              <td style=3D"padding:4px 0 0 20px">            =
    <a href=3D"https://www.glassdoor.com/Overview/Working-at-Ping-Identity-=
EI_IE380907.11,24.htm" style=3D"text-decoration:none;margin-right:16px" tit=
le=3D"Ping on Glassdoor" target=3D"_blank"><img src=3D"https://www.pingiden=
tity.com/content/dam/pic/images/misc/signature/social-glassdoor.png" style=
=3D"border:none;margin:0" alt=3D"Glassdoor logo"></a>										<a href=3D"h=
ttps://www.linkedin.com/company/21870" style=3D"text-decoration:none;margin=
-right:16px" title=3D"Ping on LinkedIn" target=3D"_blank"><img src=3D"https=
://www.pingidentity.com/content/dam/pic/images/misc/signature/social-linked=
in.png" style=3D"border:none;margin:0" alt=3D"LinkedIn logo"></a>          =
                              <a href=3D"https://twitter.com/pingidentity" =
style=3D"text-decoration:none;margin-right:16px" title=3D"Ping on Twitter" =
target=3D"_blank"><img src=3D"https://www.pingidentity.com/content/dam/pic/=
images/misc/signature/social-twitter.png" style=3D"border:none;margin:0" al=
t=3D"twitter logo"></a>										<a href=3D"https://www.facebook.com/pingid=
entitypage" style=3D"text-decoration:none;margin-right:16px" title=3D"Ping =
on Facebook" target=3D"_blank"><img src=3D"https://www.pingidentity.com/con=
tent/dam/pic/images/misc/signature/social-facebook.png" style=3D"border:non=
e;margin:0" alt=3D"facebook logo"></a>								<a href=3D"https://www.youtub=
e.com/user/PingIdentityTV" style=3D"text-decoration:none;margin-right:16px"=
 title=3D"Ping on Youtube" target=3D"_blank"><img src=3D"https://www.pingid=
entity.com/content/dam/pic/images/misc/signature/social-youtube.png" style=
=3D"border:none;margin:0 0 3px 0" alt=3D"youtube logo"></a>														<a=
 href=3D"https://plus.google.com/u/0/114266977739397708540" style=3D"text-d=
ecoration:none;margin-right:16px" title=3D"Ping on Google+" target=3D"_blan=
k"><img src=3D"https://www.pingidentity.com/content/dam/pic/images/misc/sig=
nature/social-googleplus.png" style=3D"border:none;margin:0" alt=3D"Google+=
 logo"></a>                                                        <a href=
=3D"https://www.pingidentity.com/en/blog.html" style=3D"text-decoration:non=
e;margin-right:16px" title=3D"Ping Blog" target=3D"_blank"><img src=3D"http=
s://www.pingidentity.com/content/dam/pic/images/misc/signature/social-blog.=
png" style=3D"border:none;margin:0" alt=3D"Blog logo"></a>															</=
td>            </tr>          </tbody></table>				</td>      </tr>    </tbo=
dy></table><a href=3D"https://www.gartner.com/doc/reprints?id=3D1-5423XKW&a=
mp;ct=3D180620&amp;st=3Dsb" target=3D"_blank"><img src=3D"https://www.pingi=
dentity.com/content/dam/ping-6-2-assets/images/misc/emailSignature/gartnerr=
eport-emailsig.png"></a>  </div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--0000000000004fb3d105716f1265--


From nobody Fri Jul 20 07:26:27 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC893130E3B for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:26:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zfeY5LTLPCpH for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 07:26:23 -0700 (PDT)
Received: from mail-it0-x236.google.com (mail-it0-x236.google.com [IPv6:2607:f8b0:4001:c0b::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C23B7130E2E for <oauth@ietf.org>; Fri, 20 Jul 2018 07:26:22 -0700 (PDT)
Received: by mail-it0-x236.google.com with SMTP id 16-v6so14897553itl.5 for <oauth@ietf.org>; Fri, 20 Jul 2018 07:26:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=AMn9lB63q9k9ImXLDe9vTqUxpSyPxDBB334O6+uBqx4=; b=jqavWe2JplBtPA3KS2zQqjXCgb5Hx7betnZMqn2hZvt3sU37AYRicr6LHydlobKgF4 xDrH9v058zZmeO3+yVMIlAqwhAp7Dc47EwNJHZBnDLZzt0Zr4I/gK7ZkM4jenzBgAKOF 5JSMVmD95USh7AsLW17yCUIgbMHrbnQuP9Xyw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=AMn9lB63q9k9ImXLDe9vTqUxpSyPxDBB334O6+uBqx4=; b=ZZ3zDBW5FmuFxVDu/Fkp4SZc2YTY1BhH5BoXOgzq+6uo2BMfy4ZpFOwTi1zY6gbXrI tVV8bojTtosuERhJeJj1P6mRMQxmwHlNmbOe7bJ8yyegzefLzA4Q3XneWBlLBbnix+4X 3eQT41yfHtmCtK1kprzFPUQ6MkAsX9lPeO8HKQgFamZmNyF+i7WMmqqZQvRjucres826 8t6r/RRb+GvQdrxOoMJUJO9yzqvbURgrVC0EVyZ+c++NaHJdyuVdDDYEIDJhGN7i1PIA SOqxuRlb7oMpQkgetNbx37Xgvyq8RdBCEoFbWW4+nTFFfTh6cctCxPxoJPFJEYjpYMv5 /JmQ==
X-Gm-Message-State: AOUpUlEHqxQ9/ivzCjPptM26RZuyaYaysf5aRyFeaQa9y3F+nnyviMRL p8NfpumaLDGQ/aoiFu88U0OMPDqiO5GpN8/Qf46xEH6Xk/ONnkYoCYlg4OsiMiNbm/P+AtE+L3k w5NX/ZHRqtUJ0NQ==
X-Google-Smtp-Source: AAOMgpddDjGqKiGV56jQDE6vLMZpefN1nOQfA0efW0WoL0b3Hx4jpTKgWPIJIdtz/VIT+mKev7yhszGGeSBRBOiXtBE=
X-Received: by 2002:a02:3407:: with SMTP id x7-v6mr2050318jae.110.1532096782033;  Fri, 20 Jul 2018 07:26:22 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Fri, 20 Jul 2018 07:25:51 -0700 (PDT)
In-Reply-To: <42FCE1EF-1470-4F29-86D4-8DEFCC823452@lodderstedt.net>
References: <CAGL6epJK8Fw_Rk-soO-QXmyeY6oEOh9A+ep-RYOOxzQLC1TpCw@mail.gmail.com> <CAD9ie-urtSu51s3HD+F7HPVAnR3ViFNwBaKfvXcxs2ht1xKLTw@mail.gmail.com> <TY2PR01MB229756ABC3B1098A89B11F9DF9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <42FCE1EF-1470-4F29-86D4-8DEFCC823452@lodderstedt.net>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 20 Jul 2018 10:25:51 -0400
Message-ID: <CA+k3eCSG8XZDZZNP9VucFf1C2TBw+7kAs4jnLBjusr_c32Rufw@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: n-sakimura <n-sakimura@nri.co.jp>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000074767d05716f1402"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/AGQkVzDXQjrzcRgrw7vjVW7S3UA>
Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 14:26:25 -0000

--00000000000074767d05716f1402
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

+1 with the expectation (as discussed in the WG meeting) that it'll be
reconciled with the "resource" draft with references as appropriate

On Fri, Jul 20, 2018 at 3:28 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> +1
>
> Am 20.07.2018 um 08:21 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>
> And if it were not obvious, YES J
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] *O=
n
> Behalf Of *Dick Hardt
> *Sent:* Friday, July 20, 2018 6:12 AM
> *To:* Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"
>
>
>
> I'm supportive. :)
>
>
>
> On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.co=
m>
> wrote:
>
> Hi all,
>
>
>
> This is the call for adoption of the 'Distributed OAuth' document
>
> following the positive call for adoption at the Montreal IETF meeting.
>
>
>
> Here is the document:
>
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/
>
>
>
> Please let us know by August 2nd whether you accept / object to the
>
> adoption of this document as a starting point for work in the OAuth
>
> working group.
>
>
>
> Regards,
>
> Hannes & Rifaat
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--00000000000074767d05716f1402
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1 with the expectation (as discussed in the WG meeting) t=
hat it&#39;ll be reconciled with the &quot;resource&quot; draft with refere=
nces as appropriate <br></div><div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote">On Fri, Jul 20, 2018 at 3:28 AM, Torsten Lodderstedt <span dir=
=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">t=
orsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex"><div dir=3D"auto"><div></div><div>+1</div><div><div class=3D"h5"><div><=
br>Am 20.07.2018 um 08:21 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimu=
ra@nri.co.jp" target=3D"_blank">n-sakimura@nri.co.jp</a>&gt;:<br><br></div>=
<blockquote type=3D"cite"><div>






<div class=3D"m_6770554735969871077WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">And if it were not obvious, YES
</span><span style=3D"font-family:Wingdings">J</span><span style=3D"font-fa=
mily:&quot;Arial&quot;,sans-serif"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@=
ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>] <b>On B=
ehalf Of
</b>Dick Hardt<br>
<b>Sent:</b> Friday, July 20, 2018 6:12 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Distributed OAut=
h&quot;<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">I&#39;m supportive. :)<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:05 PM, Rifaat Shekh-Yusef =
&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@=
gmail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal">Hi all,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">This is the call for adoption of the &#39;Distribute=
d OAuth&#39; document<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">following the positive call for adoption at the Mont=
real IETF meeting.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Here is the document:<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://datatracker.ietf.org/doc/draft-ha=
rdt-oauth-distributed/" target=3D"_blank">https://datatracker.ietf.org/<wbr=
>doc/draft-hardt-oauth-<wbr>distributed/</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Please let us know by August 2nd whether you accept =
/ object to the<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">adoption of this document as a starting point for wo=
rk in the OAuth<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">working group.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hannes &amp; Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
___________<wbr>_________________</span><br><span>OAuth mailing list</span>=
<br><span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.or=
g</a></span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a></=
span><br></div></blockquote></div></div></div><br>_________________________=
_____<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--00000000000074767d05716f1402--


From nobody Fri Jul 20 08:13:55 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E647E131053 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:13:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MszAmqYwcCDQ for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:13:49 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640105.outbound.protection.outlook.com [40.107.64.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58ED4130DCC for <oauth@ietf.org>; Fri, 20 Jul 2018 08:13:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vph+zRJScmeyqecHSqorW4swtwdv9sUZflXQrIkwCVo=; b=lnCxbBPogd7ZefW4Fzp7Qikgmw0thQ52FQ1gOLAeXbUjOFa3QZNW/Wi0yn6JO3JNO3GzV1aMkTnud2yozRpOdCVf3UmM/o0wuA1KVZRzaDsc/Hte6imTfdqfJ9Ormvuni3gmsBLatZl9kozIZjWUeGPCvoDa0iec6CusyttW33c=
Received: from MW2PR00MB0300.namprd00.prod.outlook.com (52.132.148.31) by MW2PR00MB0297.namprd00.prod.outlook.com (52.132.148.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1016.0; Fri, 20 Jul 2018 15:13:47 +0000
Received: from MW2PR00MB0300.namprd00.prod.outlook.com ([fe80::75b7:1894:dd72:4ede]) by MW2PR00MB0300.namprd00.prod.outlook.com ([fe80::75b7:1894:dd72:4ede%9]) with mapi id 15.20.1019.000; Fri, 20 Jul 2018 15:13:47 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, Filip Skokan <panva.ip@gmail.com>
CC: oauth <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
Thread-Index: AQHUH5tpAEJtgz4Ml0eD0vJ2JOwxQKSXJEAAgAB/7ICAABQvgIAAAxYAgABuUoCAAA7yUA==
Date: Fri, 20 Jul 2018 15:13:47 +0000
Message-ID: <MW2PR00MB0300E556CAC7F285C11DB784F5510@MW2PR00MB0300.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com> <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com>
In-Reply-To: <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:67c:1232:144:b451:cffc:cd3a:d087]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR00MB0297; 6:ohkhPZmU0LAVqZwGyTN26XtLZPsfw1CvZjLB+GyBK+xFmHetaTUR/BC43HwQJ01k4qwtMdVcw6DILs4r6wkn+QMpRb/dIx/IwfQpLriqVeQZ91/csK/Cf7qoaurEDUTepogWEYCs+hJuHKSADUXdPabZdwVuBHAwM6EsIhjaDwwaFFg+ezAOWURhC/Z4cmWFfiiV87emA0ZcFjZ/ERTvp5pE/sET1GI76lOHc/IOgB3JihHrieXEMW9ypmutCpdXuWz9IsvebypB2Ruf0IlZLH8gz+EhUphQtc8xL6IgkfviMFdaGAbqhtgNFyvrVlSQLZzEzRMXI/j69+DJoHPDALvcOjmI78PAuJuRBxZcQ3GNtcgH/+9opZS0hZDdgSVTQ8rccYv1vSe7sgHuFHRMJO9b6vptq/YXFWs7cApexdzIy30+dqY9o2QhULoXseEcR+xZmCVRFcrAvSv/u0Yy6Q==; 5:tzZyY4tSihbTPuFM5Sx94Hti0QMdXImeFJyAqlfnqHrwJ0gUFT6hWvra0txRqxeysXc7ne7JdRtF93b2ZErAyysivBAbMnUuPKsWibobB0OafZbF4GHOZoPG1U+ALAHSLz2IGLqp9/AXM7OrYUyE0zpUeqpKa7RsZtjYg96kZQ4=; 7:50UFFC1hfWGGYeJ6HwLu+xlv7KOn6ypX1xV8TNSb/aubPw4l00JP1sDsLOYwRuZp63x45Qe9e2u1r8BeRA196ndo7nfXKGjCSd9ZmlSMK9aP3MbpP78ks8LFJJ2Ns+3vYc+webgnGAbjHorzBMFe6YpnWGZctHoCbVWN+UFl/kGl6nHqPFJ0ANi4ODkZQ5zmf+nnzQ/X33oxj3p5cdCe2W3iAJG5nTjNg+5WEVyodhXYFv1kUDazvd4YPvUltIzO
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: a8e95315-3e1d-4a1e-71bd-08d5ee536454
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:MW2PR00MB0297; 
x-ms-traffictypediagnostic: MW2PR00MB0297:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <MW2PR00MB0297801F2DC590EBB73A09ABF5510@MW2PR00MB0297.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(85827821059158)(100405760836317)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3002001)(10201501046)(93006095)(93001095)(3231311)(944501410)(52105095)(2018427008)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:MW2PR00MB0297; BCL:0; PCL:0; RULEID:; SRVR:MW2PR00MB0297; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(136003)(346002)(396003)(366004)(376002)(189003)(199004)(53754006)(256004)(53936002)(9686003)(6436002)(236005)(476003)(86362001)(8936002)(2906002)(55016002)(790700001)(5250100002)(105586002)(106356001)(6306002)(81166006)(68736007)(25786009)(54896002)(8676002)(6116002)(486006)(10090500001)(446003)(99286004)(11346002)(606006)(19609705001)(86612001)(97736004)(81156014)(14444005)(7736002)(6506007)(110136005)(10290500003)(4326008)(39060400002)(478600001)(2900100001)(7696005)(8990500004)(186003)(316002)(53546011)(46003)(33656002)(74316002)(229853002)(966005)(93886005)(72206003)(5660300001)(14454004)(5024004)(102836004)(76176011)(22452003)(6246003); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR00MB0297; H:MW2PR00MB0300.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 9yJeAZcIsFHr4mO873lp3WeEljNUpnsiRBce3VGhWYdUoF0dQoKuQ7uA5uom/UBIA3HY9jQDtKP7KrCiu6NJOyiP4jQZssPk94eKMrG7lxP6iqmM6kY24oPdO4kvC5SuET/7QGHLuPBzeRo4nDLqf0sqge7V2ZekkAMX9KpXxMqdgblLKjf//uDQEd+jtXJbq4Y5+yyNK59p/rEJlaHucjJVEdhPByOi5iWGDRMEOEBScUJlmDSLDeQd8WBideNglQERTFvnW2t2BxUsA9dOUFswdjR9E7uLoL28EMijIBAo/giM3tGZNqtQk8kFesdyjBm5GHba8+mGnZA3CaASFK6wpYYCn0VVSrGp6fKxNKI=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_MW2PR00MB0300E556CAC7F285C11DB784F5510MW2PR00MB0300namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a8e95315-3e1d-4a1e-71bd-08d5ee536454
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 15:13:47.4294 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR00MB0297
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/pIBoCFxRB8zJwgD9fLsJrOhHKWk>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 15:13:53 -0000

--_000_MW2PR00MB0300E556CAC7F285C11DB784F5510MW2PR00MB0300namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MW2PR00MB0300E556CAC7F285C11DB784F5510MW2PR00MB0300namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KQGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiU2Vnb2UgVUkiOw0KCXBhbm9zZS0xOjIg
MTEgNSAyIDQgMiA0IDIgMiAzO30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1h
bCwgbGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJv
dHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmki
LHNhbnMtc2VyaWY7fQ0KYTpsaW5rLCBzcGFuLk1zb0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJp
b3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6
dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xsb3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6
OTk7DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC5tc29u
b3JtYWwwLCBsaS5tc29ub3JtYWwwLCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTpt
c29ub3JtYWw7DQoJbXNvLW1hcmdpbi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsN
Cgltc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowaW47DQoJZm9udC1z
aXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLkVt
YWlsU3R5bGUxOA0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWls
eToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjojMDAyMDYwO30NCi5Nc29DaHBEZWZhdWx0
DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixz
YW5zLXNlcmlmO30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjguNWluIDExLjBpbjsNCglt
YXJnaW46MS4waW4gMS4waW4gMS4waW4gMS4waW47fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdl
OldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86
c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2Vu
ZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVk
aXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+
PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1
ZSIgdmxpbms9InB1cnBsZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImNvbG9yOiMwMDIwNjAiPldoaWxlIEkgYWdyZWUgdGhh
dCBhIHNpbmdsZSByZXF1ZXN0ZWQgcmVzb3VyY2UgaXMgdGhlIGNvbW1vbiBjYXNlLCBlbm91Z2gg
cGVvcGxlIGhhdmUgc3Bva2VuIHVwIHdpdGggYSBuZWVkIGZvciBtdWx0aXBsZSByZXF1ZXN0ZWQg
cmVzb3VyY2VzIG92ZXIgdGhlIHllYXJzIHRoYXQgSSB0aGluayBldmVyeW9uZSB3aWxsIGJlIGJl
dHRlciBzZXJ2ZWQgYnkgbGVhdmluZw0KIHRoZSBhYmlsaXR5IHRvIHNwZWNpZnkgbXVsdGlwbGUg
cmVxdWVzdGVkIHJlc291cmNlcyBpbiB0aGUgc3BlY2lmaWNhdGlvbi48bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iY29sb3I6IzAwMjA2MCI+
PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
c3R5bGU9ImNvbG9yOiMwMDIwNjAiPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyAtLSBNaWtlPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImNvbG9yOiMwMDIwNjAiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPkZyb206PC9iPiBPQXV0aCAmbHQ7b2F1dGgtYm91bmNl
c0BpZXRmLm9yZyZndDsgPGI+T24gQmVoYWxmIE9mIDwvYj4NCkJyaWFuIENhbXBiZWxsPGJyPg0K
PGI+U2VudDo8L2I+IEZyaWRheSwgSnVseSAyMCwgMjAxOCAxMDoxOCBBTTxicj4NCjxiPlRvOjwv
Yj4gRmlsaXAgU2tva2FuICZsdDtwYW52YS5pcEBnbWFpbC5jb20mZ3Q7PGJyPg0KPGI+Q2M6PC9i
PiBvYXV0aCAmbHQ7b2F1dGhAaWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDo8L2I+IFJlOiBb
T0FVVEgtV0ddIENhbGwgZm9yIGFkb3B0aW9uIGZvciAmcXVvdDtSZXNvdXJjZSBJbmRpY2F0b3Jz
IGZvciBPQXV0aCAyLjAmcXVvdDs8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij5UaGUgY3VycmVudCBkcmFmdCBkb2VzIGFsbG93IG11bHRpcGxlICZxdW90O3Jlc291cmNlJnF1
b3Q7IHBhcmFtZXRlcnMuIEhvd2V2ZXIsIHRoZXJlIHNlZW1lZCB0byBiZSBjb25zZW5zdXMgaW4g
dGhlIFdHIG1lZXRpbmcgeWVzdGVyZGF5IHRoYXQgb25seSBhIHNpbmdsZSAmcXVvdDtyZXNvdXJj
ZSZxdW90OyBwYXJhbWV0ZXIgd2FzIHByZWZlcmFibGUgYW5kIHRoYXQgYSBjbGllbnQgY291bGQg
b2J0YWluIGFuIGFjY2VzcyB0b2tlbiBwZXIgcmVzb3VyY2UNCiAobGlrZWx5IHVzaW5nIGEgcmVm
cmVzaCB0b2tlbikuIEknbSBwZXJzb25hbGx5IHN5bXBhdGhldGljIHRvIHRoYXQgcG9pbnQuIEJ1
dCBtYXliZSBpdCdzIHRvbyByZXN0cmljdGl2ZS4gSSB3b3VsZCBsaWtlIHRvIHNlZSBzb21lIG1v
cmUgdGV4dCBhYm91dCB0aGUgY29tcGxleGl0eSBpbXBsaWNhdGlvbnMgb2YgbXVsdGlwbGUgJnF1
b3Q7cmVzb3VyY2UmcXVvdDsgcGFyYW1ldGVycyBhbmQgcGVyaGFwcyBzb21lIGRpc2NvdXJhZ2Vt
ZW50IG9mIGRvaW5nIHNvLiBJDQogYmVsaWV2ZSBsb2dpY2FsIG5hbWVzIGFyZSBtb3JlIHBvdGVu
dGlhbGx5IHVzZWZ1bCBpbiBhbiBTVFMgZnJhbWV3b3JrIGxpa2UgdG9rZW4mbmJzcDtleGNoYW5n
ZSBidXQgc2hvdWxkIGJlIG91dCBvZiBzY29wZSBmb3IgdGhpcyB3b3JrLiAmbmJzcDsNCjxvOnA+
PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZu
YnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+
Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86
cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj5PbiBGcmksIEp1bCAyMCwgMjAxOCBhdCAzOjQzIEFNLCBGaWxpcCBTa29rYW4gJmx0Ozxh
IGhyZWY9Im1haWx0bzpwYW52YS5pcEBnbWFpbC5jb20iIHRhcmdldD0iX2JsYW5rIj5wYW52YS5p
cEBnbWFpbC5jb208L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjxibG9ja3F1b3RlIHN0
eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCAjQ0NDQ0NDIDEuMHB0O3BhZGRpbmc6
MGluIDBpbiAwaW4gNi4wcHQ7bWFyZ2luLWxlZnQ6NC44cHQ7bWFyZ2luLXJpZ2h0OjBpbiI+DQo8
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkhpIFRvcnN0ZW4sPG86cD48L286cD48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpw
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZndDsmbmJzcDtNdWx0
aXBsZSAmcXVvdDtyZXNvdXJjZSZxdW90OyBwYXJhbWV0ZXJzIG1heSBiZSB1c2VkIHRvIGluZGlj
YXRlIHRoYXQgdGhlIGlzc3VlZCB0b2tlbiBpcyBpbnRlbmRlZCB0byBiZSB1c2VkIGF0IG11bHRp
cGxlIHJlc291cmNlIHNlcnZlcnMuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPlRoYXQncyBhbHJlYWR5IGluLiBGdXJ0aGVybW9yZSB3aGF0IGFi
b3V0IGxvZ2ljYWwgbmFtZXMgZm9yIHRhcmdldCBzZXJ2aWNlcz8gTGlrZSB3YXMgYWRkZWQgaW4g
LTAzIG9mIHRva2VuIGV4Y2hhbmdlPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj48YnIgY2xlYXI9ImFsbCI+DQo8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+QmVzdCw8YnI+DQo8Yj5GaWxpcCBTa29rYW48L2I+PG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4m
bmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPk9uIEZyaSwgSnVsIDIwLCAyMDE4IGF0IDk6MzMgQU0gVG9yc3RlbiBMb2RkZXJzdGVkdCAm
bHQ7PGEgaHJlZj0ibWFpbHRvOnRvcnN0ZW5AbG9kZGVyc3RlZHQubmV0IiB0YXJnZXQ9Il9ibGFu
ayI+dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ8L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlk
ICNDQ0NDQ0MgMS4wcHQ7cGFkZGluZzowaW4gMGluIDBpbiA2LjBwdDttYXJnaW4tbGVmdDo0Ljhw
dDttYXJnaW4tcmlnaHQ6MGluIj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
SSBzdXBwb3J0IGFkb3B0aW9uIG9mIHRoaXMgZG9jdW1lbnQuPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkkgd291bGQgbGlrZSB0byBwb2ludCBv
dXQgKGFnYWluKSBhIHNpbmdsZSByZXNvdXJjZSBpcyBub3Qgc3VmZmljaWVudCBmb3IgbW9zdCB1
c2UgY2FzZXMgSSBpbXBsZW1lbnRlZCBpbiB0aGUgbGFzdCBjb3VwbGUgaWYgeWVhcnMuIEnigJht
IGFkdm9jYXRpbmcgZm9yIGVuaGFuY2luZyB0aGUgZHJhZnQgdG8gc3VwcG9ydCBtdWx0aXBsZSBy
ZXNvdXJjZXMgYW5kIGEgY2xlYXIgZGVmaW5pdGlvbiBvZiB0aGUgcmVsYXRpb25zaGlwDQogYmV0
d2VlbiByZXNvdXJjZShzKSBhbmQgc2NvcGUuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibWFyZ2luLWJvdHRvbToxMi4wcHQiPjxicj4N
CkFtIDIwLjA3LjIwMTggdW0gMDg6MjAgc2NocmllYiBuLXNha2ltdXJhICZsdDs8YSBocmVmPSJt
YWlsdG86bi1zYWtpbXVyYUBucmkuY28uanAiIHRhcmdldD0iX2JsYW5rIj5uLXNha2ltdXJhQG5y
aS5jby5qcDwvYT4mZ3Q7OjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8YmxvY2txdW90ZSBzdHls
ZT0ibWFyZ2luLXRvcDo1LjBwdDttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8ZGl2Pg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1t
YXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBzdHlsZT0iZm9udC1mYW1pbHk6JnF1b3Q7QXJp
YWwmcXVvdDssc2Fucy1zZXJpZiI+JiM0MzsxDQo8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdp
bi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTomcXVvdDtBcmlhbCZx
dW90OyxzYW5zLXNlcmlmIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0
b20tYWx0OmF1dG8iPjxiPkZyb206PC9iPiBPQXV0aCBbPGEgaHJlZj0ibWFpbHRvOm9hdXRoLWJv
dW5jZXNAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5tYWlsdG86b2F1dGgtYm91bmNlc0BpZXRm
Lm9yZzwvYT5dDQo8Yj5PbiBCZWhhbGYgT2YgPC9iPkJyaWFuIENhbXBiZWxsPGJyPg0KPGI+U2Vu
dDo8L2I+IEZyaWRheSwgSnVseSAyMCwgMjAxOCA3OjQyIEFNPGJyPg0KPGI+VG86PC9iPiBSaWZh
YXQgU2hla2gtWXVzZWYgJmx0OzxhIGhyZWY9Im1haWx0bzpyaWZhYXQuaWV0ZkBnbWFpbC5jb20i
IHRhcmdldD0iX2JsYW5rIj5yaWZhYXQuaWV0ZkBnbWFpbC5jb208L2E+Jmd0Ozxicj4NCjxiPkNj
OjwvYj4gb2F1dGggJmx0OzxhIGhyZWY9Im1haWx0bzpvYXV0aEBpZXRmLm9yZyIgdGFyZ2V0PSJf
YmxhbmsiPm9hdXRoQGlldGYub3JnPC9hPiZndDs8YnI+DQo8Yj5TdWJqZWN0OjwvYj4gUmU6IFtP
QVVUSC1XR10gQ2FsbCBmb3IgYWRvcHRpb24gZm9yICZxdW90O1Jlc291cmNlIEluZGljYXRvcnMg
Zm9yIE9BdXRoIDIuMCZxdW90OzxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRv
Ij4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls
ZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPkkg
c3VwcG9ydCBhZG9wdGlvbiBvZiB0aGlzIGRvY3VtZW50Lg0KPG86cD48L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0
OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0
bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+T24gVGh1LCBKdWwgMTksIDIwMTggYXQgNDow
MSBQTSwgUmlmYWF0IFNoZWtoLVl1c2VmICZsdDs8YSBocmVmPSJtYWlsdG86cmlmYWF0LmlldGZA
Z21haWwuY29tIiB0YXJnZXQ9Il9ibGFuayI+cmlmYWF0LmlldGZAZ21haWwuY29tPC9hPiZndDsg
d3JvdGU6PG86cD48L286cD48L3A+DQo8YmxvY2txdW90ZSBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9y
ZGVyLWxlZnQ6c29saWQgI0NDQ0NDQyAxLjBwdDtwYWRkaW5nOjBpbiAwaW4gMGluIDYuMHB0O21h
cmdpbi1sZWZ0OjQuOHB0O21hcmdpbi10b3A6NS4wcHQ7bWFyZ2luLXJpZ2h0OjBpbjttYXJnaW4t
Ym90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1h
cmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIHN0eWxl
PSJmb250LXNpemU6MTIuMHB0Ij5IaSBhbGwsPGJyPg0KPGJyPg0KVGhpcyBpcyB0aGUgY2FsbCBm
b3IgYWRvcHRpb24gb2YgdGhlICdSZXNvdXJjZSBJbmRpY2F0b3JzIGZvciBPQXV0aCAyLjAnIGRv
Y3VtZW50PGJyPg0KZm9sbG93aW5nIHRoZSBwb3NpdGl2ZSBjYWxsIGZvciBhZG9wdGlvbiBhdCB0
aGUgTW9udHJlYWwgSUVURiBtZWV0aW5nLjxicj4NCjxicj4NCkhlcmUgaXMgdGhlIGRvY3VtZW50
Ojxicj4NCjwvc3Bhbj48YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQt
Y2FtcGJlbGwtb2F1dGgtcmVzb3VyY2UtaW5kaWNhdG9ycy0wMiIgdGFyZ2V0PSJfYmxhbmsiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTIuMHB0O2NvbG9yOiMxMTU1Q0MiPmh0dHBzOi8vdG9vbHMu
aWV0Zi5vcmcvaHRtbC9kcmFmdC1jYW1wYmVsbC1vYXV0aC1yZXNvdXJjZS1pbmRpY2F0b3JzLTAy
PC9zcGFuPjwvYT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+PGJyPg0KPGJyPg0KUGxl
YXNlIGxldCB1cyBrbm93IGJ5IEF1Z3VzdCAybmQgd2hldGhlciB5b3UgYWNjZXB0IC8gb2JqZWN0
IHRvIHRoZTxicj4NCmFkb3B0aW9uIG9mIHRoaXMgZG9jdW1lbnQgYXMgYSBzdGFydGluZyBwb2lu
dCBmb3Igd29yayBpbiB0aGUgT0F1dGg8YnI+DQp3b3JraW5nIGdyb3VwLjxicj4NCjxicj4NClJl
Z2FyZHMsPGJyPg0KUmlmYWF0PC9zcGFuPiA8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21hcmdpbi1ib3R0
b206MTIuMHB0Ij48YnI+DQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fXzxicj4NCk9BdXRoIG1haWxpbmcgbGlzdDxicj4NCjxhIGhyZWY9Im1haWx0bzpPQXV0
aEBpZXRmLm9yZyIgdGFyZ2V0PSJfYmxhbmsiPk9BdXRoQGlldGYub3JnPC9hPjxicj4NCjxhIGhy
ZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0i
X2JsYW5rIj5odHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxv
OnA+PC9vOnA+PC9wPg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1
dG8iPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8i
Pjxicj4NCjxiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O1NlZ29lIFVJJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzU1NTU1NTtib3JkZXI6bm9uZSB3
aW5kb3d0ZXh0IDEuMHB0O3BhZGRpbmc6MGluIj5DT05GSURFTlRJQUxJVFkgTk9USUNFOiBUaGlz
IGVtYWlsIG1heSBjb250YWluIGNvbmZpZGVudGlhbCBhbmQgcHJpdmlsZWdlZCBtYXRlcmlhbCBm
b3IgdGhlIHNvbGUgdXNlIG9mIHRoZSBpbnRlbmRlZCByZWNpcGllbnQocykuDQogQW55IHJldmll
dywgdXNlLCBkaXN0cmlidXRpb24gb3IgZGlzY2xvc3VyZSBieSBvdGhlcnMgaXMgc3RyaWN0bHkg
cHJvaGliaXRlZC4uJm5ic3A7IElmIHlvdSBoYXZlIHJlY2VpdmVkIHRoaXMgY29tbXVuaWNhdGlv
biBpbiBlcnJvciwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGJ5IGUtbWFp
bCBhbmQgZGVsZXRlIHRoZSBtZXNzYWdlIGFuZCBhbnkgZmlsZSBhdHRhY2htZW50cyBmcm9tIHlv
dXIgY29tcHV0ZXIuIFRoYW5rIHlvdS48L3NwYW4+PC9pPjwvYj48bzpwPjwvbzpwPjwvcD4NCjwv
ZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8YmxvY2txdW90ZSBzdHlsZT0ibWFyZ2luLXRv
cDo1LjBwdDttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1
dG8iPl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPGJyPg0K
T0F1dGggbWFpbGluZyBsaXN0PGJyPg0KPGEgaHJlZj0ibWFpbHRvOk9BdXRoQGlldGYub3JnIiB0
YXJnZXQ9Il9ibGFuayI+T0F1dGhAaWV0Zi5vcmc8L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93
d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aCIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBz
Oi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGg8L2E+PG86cD48L286cD48L3A+
DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5
bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj5f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCk9BdXRo
IG1haWxpbmcgbGlzdDxicj4NCjxhIGhyZWY9Im1haWx0bzpPQXV0aEBpZXRmLm9yZyIgdGFyZ2V0
PSJfYmxhbmsiPk9BdXRoQGlldGYub3JnPC9hPjxicj4NCjxhIGhyZWY9Imh0dHBzOi8vd3d3Lmll
dGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3d3
dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9i
bG9ja3F1b3RlPg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21hcmdpbi1ib3R0b206MTIuMHB0Ij48YnI+
DQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCk9B
dXRoIG1haWxpbmcgbGlzdDxicj4NCjxhIGhyZWY9Im1haWx0bzpPQXV0aEBpZXRmLm9yZyI+T0F1
dGhAaWV0Zi5vcmc8L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9vYXV0aCIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vb2F1dGg8L2E+PG86cD48L286cD48L3A+DQo8L2Jsb2NrcXVvdGU+DQo8
L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0
bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCjxiPjxpPjxzcGFuIHN0eWxlPSJmb250LXNp
emU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O1NlZ29lIFVJJnF1b3Q7LHNhbnMtc2VyaWY7Y29s
b3I6IzU1NTU1NTtib3JkZXI6bm9uZSB3aW5kb3d0ZXh0IDEuMHB0O3BhZGRpbmc6MGluIj5DT05G
SURFTlRJQUxJVFkgTk9USUNFOiBUaGlzIGVtYWlsIG1heSBjb250YWluIGNvbmZpZGVudGlhbCBh
bmQgcHJpdmlsZWdlZCBtYXRlcmlhbCBmb3IgdGhlIHNvbGUgdXNlIG9mIHRoZSBpbnRlbmRlZCBy
ZWNpcGllbnQocykuDQogQW55IHJldmlldywgdXNlLCBkaXN0cmlidXRpb24gb3IgZGlzY2xvc3Vy
ZSBieSBvdGhlcnMgaXMgc3RyaWN0bHkgcHJvaGliaXRlZC4uJm5ic3A7IElmIHlvdSBoYXZlIHJl
Y2VpdmVkIHRoaXMgY29tbXVuaWNhdGlvbiBpbiBlcnJvciwgcGxlYXNlIG5vdGlmeSB0aGUgc2Vu
ZGVyIGltbWVkaWF0ZWx5IGJ5IGUtbWFpbCBhbmQgZGVsZXRlIHRoZSBtZXNzYWdlIGFuZCBhbnkg
ZmlsZSBhdHRhY2htZW50cyBmcm9tIHlvdXIgY29tcHV0ZXIuIFRoYW5rIHlvdS48L3NwYW4+PC9p
PjwvYj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_MW2PR00MB0300E556CAC7F285C11DB784F5510MW2PR00MB0300namp_--


From nobody Fri Jul 20 08:40:09 2018
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8C9D129385 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:40:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.298
X-Spam-Level: 
X-Spam-Status: No, score=-4.298 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=oracle.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bMoU2pHqYxTI for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:40:04 -0700 (PDT)
Received: from userp2120.oracle.com (userp2120.oracle.com [156.151.31.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB419130DE3 for <oauth@ietf.org>; Fri, 20 Jul 2018 08:40:04 -0700 (PDT)
Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w6KFd4eL148992; Fri, 20 Jul 2018 15:40:00 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2018-07-02; bh=TfAvZrPIiWiG0EdprdrcO4MAt/NaCuQHj2HXsq/nBKE=; b=XRCg17ttTZJnGlnjpvHxa4sS2ew8XCAuHPS3jM60uG5PxW26fypIiir0Eh9i2n+omGx4 igfq1EPIbxslWigtQIzTasx2r5JO2K5mgc71WhFR685FbUR/1k1xKhyCjDfQIG/3cVJF cNc7DOjzztWQ9vuy9pQMGIlEz25xLRCEdG8+NhkX5+OOeXofZYaczGm8OGqIPkeJxMd2 HSmrC6kFim3uTEoiW45ldYv/B79DvDxCn/UEDX+Dc/ZUYSzKvgMOQpJt1NItS5eIEJF+ Il/woBTYQn+tMszDP0btqlm/6OJFax/qiVGYDAVmRRrZCL53K67P+zyV7/5nmfLtIFN8 Vw== 
Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by userp2120.oracle.com with ESMTP id 2k9yjxbtdy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Jul 2018 15:39:59 +0000
Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w6KFdwFv016709 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 20 Jul 2018 15:39:59 GMT
Received: from abhmp0004.oracle.com (abhmp0004.oracle.com [141.146.116.10]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w6KFdwJx019376; Fri, 20 Jul 2018 15:39:58 GMT
Received: from [10.0.1.20] (/24.86.190.97) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 20 Jul 2018 08:39:58 -0700
Content-Type: multipart/alternative; boundary=Apple-Mail-4191B48D-3DBB-432F-A1AC-65B64D3A6036
Mime-Version: 1.0 (1.0)
From: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CABh6VRHkwY-AUVmGPU3VM76a5p8--Gn=iCRmAzsKn-DcghXaLw@mail.gmail.com>
Date: Fri, 20 Jul 2018 08:39:56 -0700
Cc: oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <E25B09C9-936A-4CD6-B446-051804564C7B@oracle.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com> <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com> <CABh6VRHkwY-AUVmGPU3VM76a5p8--Gn=iCRmAzsKn-DcghXaLw@mail.gmail.com>
To: Rob Otto <robotto=40pingidentity.com@dmarc.ietf.org>
X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8959 signatures=668706
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807200174
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ca0YYNUfsZjiAO5PqDHuht_qUGI>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 15:40:08 -0000

--Apple-Mail-4191B48D-3DBB-432F-A1AC-65B64D3A6036
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

+1 adoption

I have always been concerned about clients doing introspection. Use of jwt h=
elps because responses further restricted rather than less (jwe).=20

Phil

> On Jul 20, 2018, at 7:25 AM, Rob Otto <robotto=3D40pingidentity.com@dmarc.=
ietf.org> wrote:
>=20
> I support this as well=20
>=20
>> On Fri, 20 Jul 2018 at 15:22, Brian Campbell <bcampbell=3D40pingidentity.=
com@dmarc.ietf.org> wrote:
>> +1=20
>>=20
>>> On Thu, Jul 19, 2018 at 1:51 PM, William Denniss <wdenniss=3D40google.co=
m@dmarc.ietf.org> wrote:
>>> I support adoption of this document by the working group.
>>>=20
>>>=20
>>>> On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <rifaat.ietf@gmail=
.com> wrote:
>>>> Hi all,
>>>>=20
>>>> This is the call for adoption of the 'JWT Response for OAuth Token Intr=
ospection' document following the presentation by Torsten at the Montreal IE=
TF meeting where we didn't have a chance to do a call for adoption in the me=
eting itself.
>>>>=20
>>>> Here is presentation by Torsten:
>>>> https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-ses=
sa-jwt-response-for-oauth-token-introspection-00
>>>>=20
>>>> Here is the document:
>>>> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-r=
esponse-01
>>>>=20
>>>> Please let us know by August 2nd whether you accept / object to the ado=
ption of this document as a starting point for work in the OAuth working gro=
up.
>>>>=20
>>>> Regards,
>>>> Hannes & Rifaat
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>=20
>>=20
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privilege=
d material for the sole use of the intended recipient(s). Any review, use, d=
istribution or disclosure by others is strictly prohibited...  If you have r=
eceived this communication in error, please notify the sender immediately by=
 e-mail and delete the message and any file attachments from your computer. T=
hank you._______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> --=20
> 				=09
> Rob Otto=09
> EMEA Field CTO/Solutions Architect					=
		=09
> robertotto@pingidentity.com=09
> =09
> c: +44 (0) 777 135 6092
> Connect with us: 	     =20
>=20
>=20
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
 material for the sole use of the intended recipient(s). Any review, use, di=
stribution or disclosure by others is strictly prohibited..  If you have rec=
eived this communication in error, please notify the sender immediately by e=
-mail and delete the message and any file attachments from your computer. Th=
ank you.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-4191B48D-3DBB-432F-A1AC-65B64D3A6036
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto">+1 adoption<div><br></div><div>I have alway=
s been concerned about clients doing introspection. Use of jwt helps because=
 responses further restricted rather than less (jwe).&nbsp;<br><br><div id=3D=
"AppleMailSignature">Phil</div><div><br>On Jul 20, 2018, at 7:25 AM, Rob Ott=
o &lt;<a href=3D"mailto:robotto=3D40pingidentity.com@dmarc.ietf.org">robotto=
=3D40pingidentity.com@dmarc.ietf.org</a>&gt; wrote:<br><br></div><blockquote=
 type=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_default" style=3D"f=
ont-family:tahoma,sans-serif;color:#0b5394">I support this as well&nbsp;</di=
v></div><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Fri, 20 Jul 2018 a=
t 15:22, Brian Campbell &lt;bcampbell=3D<a href=3D"mailto:40pingidentity.com=
@dmarc.ietf.org">40pingidentity.com@dmarc.ietf.org</a>&gt; wrote:<br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div dir=3D"ltr">+1 <br><div class=3D"gmail_extr=
a"><br><div class=3D"gmail_quote">On Thu, Jul 19, 2018 at 1:51 PM, William D=
enniss <span dir=3D"ltr">&lt;<a href=3D"mailto:wdenniss=3D40google.com@dmarc=
.ietf.org" target=3D"_blank">wdenniss=3D40google.com@dmarc.ietf.org</a>&gt;<=
/span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8e=
x;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">I support ad=
option of this document by the working group.<br><div><br></div></div><div c=
lass=3D"gmail_extra"><br><div class=3D"gmail_quote"><div><div class=3D"m_-44=
48980108152642778h5">On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef <s=
pan dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blan=
k">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<br></div></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><div><div class=3D"m_-4448980108152642778h5"><div dir=3D"ltr=
"><div>Hi all,</div><div><br></div><div>This is the call for adoption of the=
 'JWT Response for OAuth Token Introspection' document following the present=
ation by Torsten at the Montreal IETF meeting where we didn't have a chance t=
o do a call for adoption in the meeting itself.</div><div><br></div><div>Her=
e is presentation by Torsten:</div><div><a href=3D"https://datatracker.ietf.=
org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth-toke=
n-introspection-00" target=3D"_blank">https://datatracker.ietf.org/meeting/1=
02/materials/slides-102-oauth-sessa-jwt-response-for-oauth-token-introspecti=
on-00</a></div><div><br></div><div>Here is the document:</div><div><a href=3D=
"https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-respo=
nse-01" target=3D"_blank">https://tools.ietf.org/html/draft-lodderstedt-oaut=
h-jwt-introspection-response-01</a></div><div><br></div><div>Please let us k=
now by August 2nd whether you accept / object to the adoption of this docume=
nt as a starting point for work in the OAuth working group.</div><div><br></=
div><div>Regards,</div><div>Hannes &amp; Rifaat</div></div>
<br></div></div>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:bas=
eline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-ui=
,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Cant=
arell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><span=
 style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:basel=
ine;background:transparent;font-family:proxima-nova-zendesk,system-ui,-apple=
-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Ca=
ntarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"><font s=
ize=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidential and pr=
ivileged material for the sole use of the intended recipient(s). Any review,=
 use, distribution or disclosure by others is strictly prohibited...&nbsp; I=
f you have received this communication in error, please notify the sender im=
mediately by e-mail and delete the message and any file attachments from you=
r computer. Thank you.</font></span></i>____________________________________=
___________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr" c=
lass=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div style=3D"pa=
dding:0px;margin:0">    <table style=3D"border-collapse:collapse;padding:0;m=
argin:0">			<tbody><tr>				<td=
 style=3D"width:113px">					<a href=3D"https://=
www.pingidentity.com" target=3D"_blank"></a><a href=3D"https://www.pingident=
ity.com" target=3D"_blank"><img alt=3D"Ping Identity" src=3D"https://www.pin=
gidentity.com/content/dam/pic/images/misc/signature/ping-logo.png"></a>	=
			</td>				<td>			=
		<table>							=
					<tbody><tr>			        <td=
 style=3D"vertical-align:top">				        <span style=
=3D"color:#e61d3c;display:inline-block;margin-bottom:3px;font-family:arial,h=
elvetica,sans-serif;font-weight:bold;font-size:14px">Rob Otto</span>	=
							<br>			=
					<span style=3D"color:#000000;display:inline=
-block;margin-bottom:2px;font-family:arial,helvetica,sans-serif;font-weight:=
normal;font-size:14px">EMEA Field CTO/Solutions Architect</span>	=
							<br>			=
					<span style=3D"font-family:arial,helvetica,=
sans-serif;font-size:14px;display:inline-block;margin-bottom:3px"><a href=3D=
"mailto:robertotto@pingidentity.com" target=3D"_blank">robertotto@pingidenti=
ty.com</a></span>							=
	<br>								<span style=
=3D"color:#000000;display:inline-block;margin-bottom:2px;font-family:arial,h=
elvetica,sans-serif;font-weight:normal;font-size:14px">			=
					</span>				=
				<br>						=
		<span style=3D"color:#000000;display:inline-block;margin-bottom:2px=
;font-family:arial,helvetica,sans-serif;font-weight:normal;font-size:14px">=
								c: +44 (0) 777 135 6=
092</span>							</td>	=
		      </tr>					</tbody></table>=
				</td>			</tr>			<tr=
>				        <td colspan=3D"2">          <table s=
tyle=3D"border-collapse:collapse;border:none;margin:8px 0 0 0;width:100%">  =
        	<tbody><tr style=3D"height:40px;border-top:1px solid #d3d3d=
3;border-bottom:1px solid #d3d3d3">              <td style=3D"font-family:ar=
ial,helvetica,sans-serif;font-size:14px;font-weight:bold;color:#40474b">Conn=
ect with us: </td>              <td style=3D"padding:4px 0 0 20px">         =
       <a href=3D"https://www.glassdoor.com/Overview/Working-at-Ping-Identit=
y-EI_IE380907.11,24.htm" style=3D"text-decoration:none;margin-right:16px" ti=
tle=3D"Ping on Glassdoor" target=3D"_blank"><img src=3D"https://www.pingiden=
tity.com/content/dam/pic/images/misc/signature/social-glassdoor.png" style=3D=
"border:none;margin:0" alt=3D"Glassdoor logo"></a>			=
							<a href=3D"https://www.link=
edin.com/company/21870" style=3D"text-decoration:none;margin-right:16px" tit=
le=3D"Ping on LinkedIn" target=3D"_blank"><img src=3D"https://www.pingidenti=
ty.com/content/dam/pic/images/misc/signature/social-linkedin.png" style=3D"b=
order:none;margin:0" alt=3D"LinkedIn logo"></a>                             =
           <a href=3D"https://twitter.com/pingidentity" style=3D"text-decora=
tion:none;margin-right:16px" title=3D"Ping on Twitter" target=3D"_blank"><im=
g src=3D"https://www.pingidentity.com/content/dam/pic/images/misc/signature/=
social-twitter.png" style=3D"border:none;margin:0" alt=3D"twitter logo"></a>=
									=
	<a href=3D"https://www.facebook.com/pingidentitypage" style=3D"text-decorat=
ion:none;margin-right:16px" title=3D"Ping on Facebook" target=3D"_blank"><im=
g src=3D"https://www.pingidentity.com/content/dam/pic/images/misc/signature/=
social-facebook.png" style=3D"border:none;margin:0" alt=3D"facebook logo"></=
a>								<a href=3D"=
https://www.youtube.com/user/PingIdentityTV" style=3D"text-decoration:none;m=
argin-right:16px" title=3D"Ping on Youtube" target=3D"_blank"><img src=3D"ht=
tps://www.pingidentity.com/content/dam/pic/images/misc/signature/social-yout=
ube.png" style=3D"border:none;margin:0 0 3px 0" alt=3D"youtube logo"></a>=
										=
				<a href=3D"https://plus.google.com/u/0/114266977739=
397708540" style=3D"text-decoration:none;margin-right:16px" title=3D"Ping on=
 Google+" target=3D"_blank"><img src=3D"https://www.pingidentity.com/content=
/dam/pic/images/misc/signature/social-googleplus.png" style=3D"border:none;m=
argin:0" alt=3D"Google+ logo"></a>                                          =
              <a href=3D"https://www.pingidentity.com/en/blog.html" style=3D=
"text-decoration:none;margin-right:16px" title=3D"Ping Blog" target=3D"_blan=
k"><img src=3D"https://www.pingidentity.com/content/dam/pic/images/misc/sign=
ature/social-blog.png" style=3D"border:none;margin:0" alt=3D"Blog logo"></a>=
									=
						</td>            </tr>          </t=
body></table>				</td>      </tr>    </tbody></table=
><a href=3D"https://www.gartner.com/doc/reprints?id=3D1-5423XKW&amp;ct=3D180=
620&amp;st=3Dsb" target=3D"_blank"><img src=3D"https://www.pingidentity.com/=
content/dam/ping-6-2-assets/images/misc/emailSignature/gartnerreport-emailsi=
g.png"></a>  </div></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:bas=
eline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-ui=
,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Cant=
arell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><span=
 style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:basel=
ine;background:transparent;font-family:proxima-nova-zendesk,system-ui,-apple=
-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Ca=
ntarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"><font s=
ize=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidential and pr=
ivileged material for the sole use of the intended recipient(s). Any review,=
 use, distribution or disclosure by others is strictly prohibited..&nbsp; If=
 you have received this communication in error, please notify the sender imm=
ediately by e-mail and delete the message and any file attachments from your=
 computer. Thank you.</font></span></i></div></blockquote><blockquote type=3D=
"cite"><div><span>_______________________________________________</span><br>=
<span>OAuth mailing list</span><br><span><a href=3D"mailto:OAuth@ietf.org">O=
Auth@ietf.org</a></span><br><span><a href=3D"https://www.ietf.org/mailman/li=
stinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></span><br></di=
v></blockquote></div></body></html>=

--Apple-Mail-4191B48D-3DBB-432F-A1AC-65B64D3A6036--


From nobody Fri Jul 20 08:47:42 2018
Return-Path: <mdobrinic@cozmanova.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 991541310C1 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:47:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sYKKBG-DBr34 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 08:47:36 -0700 (PDT)
Received: from lb3-smtp-cloud8.xs4all.net (lb3-smtp-cloud8.xs4all.net [194.109.24.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28D5B130E02 for <oauth@ietf.org>; Fri, 20 Jul 2018 08:47:35 -0700 (PDT)
Received: from speedyM.local ([IPv6:2a02:a446:bd2c:1:70ff:cc25:1c6c:726a]) by smtp-cloud8.xs4all.net with ESMTPA id gXcwfupAmoj71gXcyfBG2H; Fri, 20 Jul 2018 17:47:34 +0200
To: Phil Hunt <phil.hunt@oracle.com>, Rob Otto <robotto=40pingidentity.com@dmarc.ietf.org>
Cc: oauth <oauth@ietf.org>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com> <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com> <CABh6VRHkwY-AUVmGPU3VM76a5p8--Gn=iCRmAzsKn-DcghXaLw@mail.gmail.com> <E25B09C9-936A-4CD6-B446-051804564C7B@oracle.com>
From: Mark Dobrinic <mdobrinic@cozmanova.com>
Openpgp: preference=signencrypt
Autocrypt: addr=mdobrinic@cozmanova.com; prefer-encrypt=mutual; keydata= xsFNBFnEuoUBEADAZzzoEAf+nZ7T/UPgTXTgQOxfC8Htnkn07pJ84ee4z1qtF+xSHXJPhXJj g6VhJC5+GqP0yXuAIDx0nqLHoyrydvR+2KRNs9OBAejBMdqum7bX8Ql84jj5UvMzJSrQFSr8 15i2g2tVR2+wVSQI9RwvbsAGWChQfOigjwZiICHd90r9EaM/SpWHkyLYvIJwvbOD726jmRAU /FUu4CX06PYK1A5NkWrjD3Y7+fvPgrV5DjgQci/W+WgVkrIJdW3PHlkBW81u43WTBBAhEWLa RkoYr/Kvt5y+KTP6oGVppvJ9B58oa3W2W6BhGHSa5vIlFQC+zRzUO5iiTNDmwGsrNBR9wcKc E7OopYBlgstz/fJW4+XAwJSUGaN/tTkc1XFuBw4bzTYwTTYLk8ur0+LNSTKP0Hi5LJ5iwS44 oAqplJGUBqMRQtcWKLGW1By/t6kWV9rf+NdCn9FaN+MRmWEtU5/KDYQspSXWbdPPbhE/somV vk7txHS1Q5Pfe8RyAIJ5W6YblhfD9nm7s+o/qIVjLmlZHMeB7f2bqa0GpQMGZswLCiGTlNa+ dCQwMqBaXWCtE5JB9qgnb1+HhJSPhevb4NAqy+Bpx/DUUXsUCyVHbB4ZJT83BzEuiVaJBXuV 4aYATmeQ3vSOHQhdgSbvjaYOhpcUekjCLV/0xFPkSGk37ThQtwARAQABzSdNYXJrIERvYnJp bmljIDxtZG9icmluaWNAY296bWFub3ZhLmNvbT7CwZQEEwEIAD4WIQQWQdwtTBz/Q2zpHSvZ X2lHE9zaFgUCWcS6hQIbIwUJCWYBgAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDZX2lH E9zaFpTHD/9jwrgTBrGGRAnOtQ3p1lBiJI2vZfqKi6ZqNtggMMmM3RifMQbxCFrII3QjyTDB ZxHTLQWctBMCbA3F8VvUjvSqH444sBDGv2TVyILIjMSqKXoiKNhSYcEvUTOOfU87ouuNW0F/ tRg7irhypHUXUyZbF04gbdmWfQwllVinaoR30meO9Vk1gthFpbNsjqnXpLbPzacSVYwQJxc6 8xaW5djbOXAVwgVMq27p/IN7lYva8S2/WC81BvjGNF4pohHDu3DIdYhtQAh+PKRbTsZErlk0 GcVoTSs71l5A9QC7JgVK5MagzHcCzGDqtDZFfOfXFFpSi6obF0/W1XDNSz3TPlJyJMvn0N1V BS/TRAzGO59apiagcd5Z4nCcheOAFhPELclW7dggtCG5bCTU1G/+mMOVo7HZaD9LI0/ETqdv 8UZetXNSDR93UlUqEBUBHY73FL4ZqIsM+4I01IgMidumB2yBieMonONYabAKw3/x7J74CejL 7FglultGVpRoI8BUEtT5Kc7zZi3kxCNArLTiS0M1MTJKaNNY3qsIZy/N1Y3sdAOSuPKo8178 bzNKO9or14LTKV9RpyGDLu5XLf1OMdcESIOL2gfyaMlRtrjjtqL1EyTWYWOYuyRx8YIMUkPq RhFnwmgCsIqJ9waAukM6h5aTmBvsidQeOKMimBjF1Cqx1s7BTQRZxLqFARAAuo3PVWUs1jih vsQnx7FxJaXWc3EGxYq5JT1bzhXdnEMbD7E9UIRIrV1fh2GQVacx+jmfe+zC53ADMSLPxkGb 7E/MliQN07B4BCfk1yHEmNioo8FBfEj2KKcKgFIBp13ELzCsEL2kyWN+OvHNXWftfUXcUXuH m2veI5KyFTXz2m4xk/MxsPvTqf86MeugnmamiNoH1N5VLeX/UlXv3y2gm3pAeb0999tFnVIq TjwwQEAMvS4e1tZC/YsfB2epA49f+zDsTIBykmWfqdKDABzElIbZoSOHoqJIfIDsTgJnmJhw /Xi8TydKWtf2rmDaldcMgPv7mGmVgglGjdDEHk4gd79VcVXNP/0KfP2uEfubZrqJmKgYQDJZ 8CwWgpRaIy2SlUNqMsyh2x284R3FtUoL08PdP48MIGPX+bBbOorM+mJ68EoNcy9eJbRP/MBH 2qHJpSaq2CTS8z8PlTaZKhEq7MJiTirrxzr6k+uk03G5i271mUcpGZlCCwWJQisvfoFOwEqc UEi9pXW3tA6D9yagq6dPgy0OwheAEeNwiFduk1H5EtKLWuWHo+fcgjWdmv4+oF5icdY6EfYh 7yovI8sn5gJU9oDRRMoVG0UpeHxxO2XCmOa7TP8wm4C6xUxIssYGe5FRXX1weCTWUhJYQiS+ KHQwhR7DwK+TkguOfwXWxTkAEQEAAcLBfAQYAQgAJhYhBBZB3C1MHP9DbOkdK9lfaUcT3NoW BQJZxLqFAhsMBQkJZgGAAAoJENlfaUcT3NoW9/oQAIAI6SBsVZYS6gKxctZ1/pVuakj3GiDn LVNT+iAgaXyyRF8VorW1xJLHq07ZPubzYy/TqkMlwqdOlVQtFg+fwRuOSF7Gqt8Qsay0rU6Y tS7y7zojhcqtIRQA1MrhCPUMv3itKXt4pt0Ky3syoRRmiudFLhUdEcNB0aWb1udRf0kI4408 dpcZXcgbkoQe4ZN4P8SuUFSHpySUAEyZdXceQtehsdN43oApQBDnj5JDeBelbWnduZ4kBOax /3CWrG3CTOrrhwuiJx/VXAbq388U3aN6rurCKb/UAX81yZHVjZ5wiUkTjGdfXZFf+9rO5Dck M+jsVgB92jXPDaGxBRqVpRQlalgjUVEzEy5uevLp6sEjP4gFeHvSo9QwiIqgnRIANKfqf+au DSoeIHDazbHfYMmeIr4bEz3pCcT7pFliG+E5QnUfHUu/Bw55VCU4+9Yw9nmPkXI/RZOJRbTS O1DysaP/GF3U9rgO/st67YgZDUYO7L/d5eYHuCC9ukVOM3ALgjWryIHWV2knvV7dfgVPz3r+ zF9t3uK37cE38vgv0bdoZ+NBZwXF4+CK2wGN3wCErUz7vOnoBR1Osph4nm/qwXlXv6mxY3XK mUNYwLxQn7Lfau0t+6/SsC/6va13rSOc43vXI/Cqtkzwzkysg/phmZDr8HLpaboGOWZkWPUF 4I+B
Message-ID: <670e70fd-d494-9153-9b41-5cab0eab0dd0@cozmanova.com>
Date: Fri, 20 Jul 2018 17:47:30 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <E25B09C9-936A-4CD6-B446-051804564C7B@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-CMAE-Envelope: MS4wfNE0d0t1Y6PgeajyKkE8H/NrXGrccuIp/J0MSXUu56TxaPaJ592XTIXjrzJXrkfnFMjRwaan/W5uIfKE1frcTntBoRSOm+AyWt06nrFF+FcCPwUgSIMl M0hGCXS9kMsKH067uJe/Kbk7n0mpCYJEwOAIxsKfYcjujCG87V9po7th6mzlQpKD8FQenSaDFYX0RpUT5+0S7ZUlZ5R1Sv/kgHYH+0CJD1mEqAx25nywGcnq F3ibUoLPvdO/YXDaW2FSc1Ew1NXCNKBCe3otG4lENl8Fcn9rFB9aZHhhKR5xFCNNOmhd9Y7apPD7otjG+hfJFA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_zT2j35ZQo2y-d2lOOWMxcr__EE>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 15:47:41 -0000

I +1 this,

but at the same time, I'm wondering what happened with the argument that
this should be solved by Token Exchange instead of Introspect?

Cheers!

Mark


On 20/07/18 17:39, Phil Hunt wrote:
> +1 adoption
> 
> I have always been concerned about clients doing introspection. Use of
> jwt helps because responses further restricted rather than less (jwe).Â 
> 
> Phil
> 
> On Jul 20, 2018, at 7:25 AM, Rob Otto
> <robotto=40pingidentity.com@dmarc.ietf.org
> <mailto:robotto=40pingidentity.com@dmarc.ietf.org>> wrote:
> 
>> I support this as wellÂ 
>>
>> On Fri, 20 Jul 2018 at 15:22, Brian Campbell
>> <bcampbell=40pingidentity.com@dmarc.ietf.org
>> <mailto:40pingidentity.com@dmarc.ietf.org>> wrote:
>>
>>     +1
>>
>>     On Thu, Jul 19, 2018 at 1:51 PM, William Denniss
>>     <wdenniss=40google.com@dmarc.ietf.org
>>     <mailto:wdenniss=40google.com@dmarc..ietf.org>> wrote:
>>
>>         I support adoption of this document by the working group.
>>
>>
>>         On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef
>>         <rifaat.ietf@gmail.com <mailto:rifaat.ietf@gmail.com>> wrote:
>>
>>             Hi all,
>>
>>             This is the call for adoption of the 'JWT Response for
>>             OAuth Token Introspection' document following the
>>             presentation by Torsten at the Montreal IETF meeting where
>>             we didn't have a chance to do a call for adoption in the
>>             meeting itself.
>>
>>             Here is presentation by Torsten:
>>             https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth-token-introspection-00
>>
>>             Here is the document:
>>             https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01
>>
>>             Please let us know by August 2nd whether you accept /
>>             object to the adoption of this document as a starting
>>             point for work in the OAuth working group.
>>
>>             Regards,
>>             Hannes & Rifaat
>>
>>             _______________________________________________
>>             OAuth mailing list
>>             OAuth@ietf.org <mailto:OAuth@ietf.org>
>>             https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>         _______________________________________________
>>         OAuth mailing list
>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>     /CONFIDENTIALITY NOTICE: This email may contain confidential and
>>     privileged material for the sole use of the intended recipient(s).
>>     Any review, use, distribution or disclosure by others is strictly
>>     prohibited...Â  If you have received this communication in error,
>>     please notify the sender immediately by e-mail and delete the
>>     message and any file attachments from your computer. Thank
>>     you./_______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> -- 
>> <https://www.pingidentity.com>Ping Identity
>> <https://www.pingidentity.com>		
>> Rob Otto	
>> EMEA Field CTO/Solutions Architect	
>> robertotto@pingidentity.com <mailto:robertotto@pingidentity.com>	
>>
>> c: +44 (0) 777 135 6092	
>>
>> Connect with us: 	Glassdoor logo
>> <https://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907.11,24.htm>
>> LinkedIn logo <https://www.linkedin.com/company/21870> twitter logo
>> <https://twitter.com/pingidentity>	facebook logo
>> <https://www.facebook.com/pingidentitypage>	youtube logo
>> <https://www.youtube.com/user/PingIdentityTV>	Google+ logo
>> <https://plus.google.com/u/0/114266977739397708540> Blog logo
>> <https://www.pingidentity.com/en/blog.html>	
>>
>> <https://www.gartner.com/doc/reprints?id=1-5423XKW&ct=180620&st=sb>
>>
>> /CONFIDENTIALITY NOTICE: This email may contain confidential and
>> privileged material for the sole use of the intended recipient(s). Any
>> review, use, distribution or disclosure by others is strictly
>> prohibited..Â  If you have received this communication in error, please
>> notify the sender immediately by e-mail and delete the message and any
>> file attachments from your computer. Thank you./
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 


From nobody Fri Jul 20 10:37:38 2018
Return-Path: <rjsparks@nostrum.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C4CE130DEE; Fri, 20 Jul 2018 10:37:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.879
X-Spam-Level: 
X-Spam-Status: No, score=-1.879 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D4sEOPKC4ESE; Fri, 20 Jul 2018 10:37:24 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 714BF130F74; Fri, 20 Jul 2018 10:37:21 -0700 (PDT)
Received: from dhcp-84b0.meeting.ietf.org (dhcp-84b0.meeting.ietf.org [31.133.132.176]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w6KHbIKh017114 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 20 Jul 2018 12:37:19 -0500 (CDT) (envelope-from rjsparks@nostrum.com)
From: Robert Sparks <rjsparks@nostrum.com>
To: gen-art@ietf.org
Cc: draft-ietf-oauth-device-flow.all@ietf.org, ietf@ietf.org, oauth@ietf.org
References: <152873404689.2672.12557627140070509936@ietfa.amsl.com>
Message-ID: <c53a8e8f-7873-3c5a-aa6f-3e0a896c9a88@nostrum.com>
Date: Fri, 20 Jul 2018 13:37:15 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <152873404689.2672.12557627140070509936@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/xFhJ-B5jCpWe9rgjcHidfMUZNlk>
Subject: Re: [OAUTH-WG] [Gen-art] Genart last call review of draft-ietf-oauth-device-flow-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 17:37:27 -0000

As far as I can tell, there has been no response to this. The document 
revision just updated a reference to reflect an rfc having been published.

Apologies if I missed a response.

RjS


On 6/11/18 12:20 PM, Robert Sparks wrote:
> Reviewer: Robert Sparks
> Review result: Ready with Nits
>
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
>
> For more information, please see the FAQ at
>
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>
> Document: draft-ietf-oauth-device-flow-10
> Reviewer: Robert Sparks
> Review Date: 2018-06-11
> IETF LC End Date: 2018-06-12
> IESG Telechat date: Not scheduled for a telechat
>
> Summary: Ready for publication as a Proposed Standard RFC, but with nits to
> consider
>
> Nits/editorial comments:
>
> In 3.5 "the client MUST use a reasonable default polling interval" is not
> testable. Who determines "reasonable"? At the very least, you should add some
> text about how to determine what "reasonable" is for a given device, and add
> some text that says don't poll faster than earlier responses limited you to.
> For example, if the response at step B in the introductory diagram had an
> explicit interval of 15, but a slow-down response to an E message didn't have
> an explicit interval, you don't want them to default to, say 5 seconds (because
> that's what the example in section 3.2 said, so it must be reasonable).
>
> In 3.3, you say the device_code MUST NOT be displayed or communicated. Is there
> a security property that's lost if there is? Or is this just saying "Don't
> waste space or the user's time"?
>
> The last paragraph of section 6.1 feels like a recipe for false positives, and
> for bug-entrenched code. Please reconsider it.
>
> You need line-folding in the example in section 3.2
>
>
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From nobody Fri Jul 20 10:46:43 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8103C1310A6 for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 10:46:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9AIYmhFCsQvI for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 10:46:39 -0700 (PDT)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0C89130F17 for <oauth@ietf.org>; Fri, 20 Jul 2018 10:46:39 -0700 (PDT)
Received: by mail-pg1-x52e.google.com with SMTP id r1-v6so7461947pgp.11 for <oauth@ietf.org>; Fri, 20 Jul 2018 10:46:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=zawHkHOWgc39wxQlZVFgNDF3fZtGJJDEBn1gCNhXCQE=; b=dNBrrdnSTbXihYLxkF1qks02rtJHu844jRm71CAy3rGLt1h/B3vj0C+oIISbE+Q5/j GzxgGgVJZu8bRpVKvFpBJdswD4uHndbN4cWDRz2Vi65QHyuW96F2p2bg5f/Zd7VlRvx/ 06kHJbe2s5BvMqvIUVpc6bKsmsqNPGMi07k4+ELy+sTMDa5xLPM+GlA8cLK7lty7HZTW GJeBEIbafgaygxx4IeaP3fOkTyFE+ramQe/JjYRuL6XWRrqVOnhQ7sNklUpBF3MWwMbn PpjXg8b+WVp9g+NjPILgfNlNyWPBYmMvAx2QVGIB+0u93z1IMJ58/LZ9GvRR3Hhtv3Fb YXhg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=zawHkHOWgc39wxQlZVFgNDF3fZtGJJDEBn1gCNhXCQE=; b=tfADq2eUsm8vuCQztLu/taDdn8fJOPAKaU8+QxKxgKUG//fnMVpMiicFuIiBpcYEfn KcPxNFi31JVoozFUC2J59XQ5mS8cexazChAVvoLjCD55O3EX8nZCQBdBWL/DdUYehmwi XZpylqB18yHSq3TrtOoOZg/FPteX8R2ld6n2pPIn54eTrqGqwGFmM35mx15bzLSlJh7b FehrDA3B948wFhwvCLJEVmpZu3MnsLkud2cv+ZWZh/+AI/Ein7ZPMVplq3K4RHsohZr9 wImyH4+67vIKHP3/f3Dec6dkTHRxdBwswNYZQb1ITGQi39l4Fl0pj03EjUP2Qz5t3oIm fk0g==
X-Gm-Message-State: AOUpUlHwJxS/LozO38Yaj0yiaSSo4nvahpe5ZgvyVDNC3x34z2/aRJky al2omuoEnOy495Amgyl5JswkgAyzJuDDMuXwsMk=
X-Google-Smtp-Source: AAOMgpcgyZdl1cMVR7WBuVYIzi8h452idBlE9UdFN0PSza2KyUBMGvP+jtRRHnm0SLAqzdLwVB9gYGPS5FxyMSHWWNw=
X-Received: by 2002:aa7:84c2:: with SMTP id x2-v6mr3110817pfn.220.1532108799141;  Fri, 20 Jul 2018 10:46:39 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Fri, 20 Jul 2018 10:46:18 -0700 (PDT)
In-Reply-To: <MW2PR00MB0300E556CAC7F285C11DB784F5510@MW2PR00MB0300.namprd00.prod.outlook.com>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com> <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com> <MW2PR00MB0300E556CAC7F285C11DB784F5510@MW2PR00MB0300.namprd00.prod.outlook.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Fri, 20 Jul 2018 13:46:18 -0400
Message-ID: <CAD9ie-saxrBABtc6Z5AQLT9M0tk92HF7ATZBETPTaC=TnfstMw@mail.gmail.com>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>,  Filip Skokan <panva.ip@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000baebf7057171e054"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/H4JLxiY-vt8ZdFpvVBKy5l_BrGU>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 17:46:43 -0000

--000000000000baebf7057171e054
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

There are a few places where multiple resources could be used:

One is in the code flow where it is desirable to optimize the user
experience so that the user is granting authorization once, and not
multiple times.

The second is in the access token request, which leads to the third
instance, which is in the access token. If an access token is being
returned for each resource, then making a single request is simpler, it
seems to complicate the interface more.

If we want to have audience constrained access tokens, then it is safer to
have only one resource in the access token - otherwise each resource can
use the access token to access the other resources.

All of these examples assume that it is a single AS. Supporting multiple AS
in a single request seems super complicated and wrought with security and
trust issues.




On Fri, Jul 20, 2018 at 11:13 AM, Mike Jones <
Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:

> While I agree that a single requested resource is the common case, enough
> people have spoken up with a need for multiple requested resources over t=
he
> years that I think everyone will be better served by leaving the ability =
to
> specify multiple requested resources in the specification.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of * Brian Campbell
> *Sent:* Friday, July 20, 2018 10:18 AM
> *To:* Filip Skokan <panva.ip@gmail.com>
>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> The current draft does allow multiple "resource" parameters. However,
> there seemed to be consensus in the WG meeting yesterday that only a sing=
le
> "resource" parameter was preferable and that a client could obtain an
> access token per resource (likely using a refresh token). I'm personally
> sympathetic to that point. But maybe it's too restrictive. I would like t=
o
> see some more text about the complexity implications of multiple "resourc=
e"
> parameters and perhaps some discouragement of doing so. I believe logical
> names are more potentially useful in an STS framework like token exchange
> but should be out of scope for this work.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan <panva.ip@gmail.com> wrote:
>
> Hi Torsten,
>
>
>
> > Multiple "resource" parameters may be used to indicate that the issued
> token is intended to be used at multiple resource servers.
>
>
>
> That's already in. Furthermore what about logical names for target
> services? Like was added in -03 of token exchange?
>
>
> Best,
> *Filip Skokan*
>
>
>
>
>
> On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
> I support adoption of this document.
>
>
>
> I would like to point out (again) a single resource is not sufficient for
> most use cases I implemented in the last couple if years. I=E2=80=98m adv=
ocating
> for enhancing the draft to support multiple resources and a clear
> definition of the relationship between resource(s) and scope.
>
>
> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>
> +1
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] *O=
n
> Behalf Of *Brian Campbell
> *Sent:* Friday, July 20, 2018 7:42 AM
> *To:* Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators for
> OAuth 2.0"
>
>
>
> I support adoption of this document.
>
>
>
> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.co=
m>
> wrote:
>
> Hi all,
>
> This is the call for adoption of the 'Resource Indicators for OAuth 2.0'
> document
> following the positive call for adoption at the Montreal IETF meeting.
>
> Here is the document:
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth
> working group.
>
> Regards,
> Rifaat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.=
.
> If you have received this communication in error, please notify the sende=
r
> immediately by e-mail and delete the message and any file attachments fro=
m
> your computer. Thank you.*
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.=
.
> If you have received this communication in error, please notify the sende=
r
> immediately by e-mail and delete the message and any file attachments fro=
m
> your computer. Thank you.*
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--000000000000baebf7057171e054
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">There are a few places where multiple resources could be u=
sed:<div><br></div><div>One is in the code flow where it is desirable to op=
timize the user experience so that the user is granting authorization once,=
 and not multiple times.=C2=A0</div><div><br></div><div>The second is in th=
e access token request, which leads to the third instance, which is in the =
access token. If an access token is being returned for each resource, then =
making a single request is simpler, it seems to complicate the interface mo=
re.</div><div><br></div><div>If we want to have audience constrained access=
 tokens, then it is safer to have only one resource in the access token - o=
therwise each resource can use the access token to access the other resourc=
es.</div><div><br></div><div>All of these examples assume that it is a sing=
le AS. Supporting multiple AS in a single request seems super complicated a=
nd wrought with security and trust issues.</div><div><br></div><div><br></d=
iv><div><br></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Fri, Jul 20, 2018 at 11:13 AM, Mike Jones <span dir=3D"ltr">&lt;<=
a href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.org" target=3D"=
_blank">Michael.Jones=3D40microsoft.com@dmarc.ietf.org</a>&gt;</span> wrote=
:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-5558039706233506919WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">While I agree that a s=
ingle requested resource is the common case, enough people have spoken up w=
ith a need for multiple requested resources over the years that I think eve=
ryone will be better served by leaving
 the ability to specify multiple requested resources in the specification.<=
u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounc=
es@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 10:18 AM<br>
<b>To:</b> Filip Skokan &lt;<a href=3D"mailto:panva.ip@gmail.com" target=3D=
"_blank">panva.ip@gmail.com</a>&gt;</p><div><div class=3D"h5"><br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></div></div><p></p><div><div class=3D"=
h5">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">The current draft does allow multiple &quot;resource=
&quot; parameters. However, there seemed to be consensus in the WG meeting =
yesterday that only a single &quot;resource&quot; parameter was preferable =
and that a client could obtain an access token per resource
 (likely using a refresh token). I&#39;m personally sympathetic to that poi=
nt. But maybe it&#39;s too restrictive. I would like to see some more text =
about the complexity implications of multiple &quot;resource&quot; paramete=
rs and perhaps some discouragement of doing so. I
 believe logical names are more potentially useful in an STS framework like=
 token=C2=A0exchange but should be out of scope for this work. =C2=A0
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan &lt;<a=
 href=3D"mailto:panva.ip@gmail.com" target=3D"_blank">panva.ip@gmail.com</a=
>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal">Hi Torsten,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&gt;=C2=A0Multiple &quot;resource&quot; parameters m=
ay be used to indicate that the issued token is intended to be used at mult=
iple resource servers.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">That&#39;s already in. Furthermore what about logica=
l names for target services? Like was added in -03 of token exchange?<u></u=
><u></u></p>
</div>
<p class=3D"MsoNormal"><br clear=3D"all">
<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">Best,<br>
<b>Filip Skokan</b><u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt =
&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lo=
dderstedt.net</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal">I support adoption of this document.<u></u><u></u></=
p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I would like to point out (again) a single resource =
is not sufficient for most use cases I implemented in the last couple if ye=
ars. I=E2=80=98m advocating for enhancing the draft to support multiple res=
ources and a clear definition of the relationship
 between resource(s) and scope.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
Am 20.07.2018 um 08:20 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimura@=
nri.co.jp" target=3D"_blank">n-sakimura@nri.co.jp</a>&gt;:<u></u><u></u></p=
>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">+1
</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@=
ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document.
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef =
&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@=
gmail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-=
bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/<wbr>draft-campbell-oauth-resource-<wbr>i=
ndicators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#555555;border:none windowtext 1.0pt;padding:0in">CONFIDENTIAL=
ITY NOTICE: This email may contain confidential and privileged material for=
 the sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibit=
ed..=C2=A0 If you have received this communication in error, please notify =
the sender immediately by e-mail and delete the message and any file attach=
ments from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">______________________________<wbr>_________________=
<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal">______________________________<wbr>_________________=
<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#555555;border:none windowtext 1.0pt;padding:0in">CONFIDENTIAL=
ITY NOTICE: This email may contain confidential and privileged material for=
 the sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibit=
ed..=C2=A0 If you have received this communication in error, please notify =
the sender immediately by e-mail and delete the message and any file attach=
ments from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div></div></div>
</div>

<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--000000000000baebf7057171e054--


From nobody Fri Jul 20 10:47:12 2018
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F0C213121B; Fri, 20 Jul 2018 10:47:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hsgVMPQCZOXe; Fri, 20 Jul 2018 10:46:52 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70088.outbound.protection.outlook.com [40.107.7.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83A0B131206; Fri, 20 Jul 2018 10:46:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Kb3BmnW2S+UYOPzj0ibtUfOR+/bvpi+KXZKsXC5cAZc=; b=FCMYLzsJOXkV0kV5v/DU+Io2ivFaukStz1ynyEB19mvMPI+sesdgGywZvOjvutSzx+BHmFhBk67iHnlRvQ8QIwRs1NiZwle+2P3ycvIu5oklyA+eC7NTQ+4thkN7YeDsS+9rEBWUgnj0K0ZDyRQBOJp+AFsPbBDOIwFeg6vUX0w=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB2734.eurprd08.prod.outlook.com (10.166.198.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.973.16; Fri, 20 Jul 2018 17:46:47 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0952.021; Fri, 20 Jul 2018 17:46:47 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: oauth <oauth@ietf.org>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: Progressing the HTTP parameter encoding for OAuth PoP Key Distribution
Thread-Index: AdQgUXSupVvWyMaDROO8wlEEZAEOPA==
Date: Fri, 20 Jul 2018 17:46:47 +0000
Message-ID: <VI1PR0801MB21120EA478D0783F9FCDDC0DFA510@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com; 
x-originating-ip: [31.133.157.45]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB2734; 6:Y2AZyeokipQ4BNAGspOu9ex3njbPBb60KUFjuKybxcK8lCGDVtv1KnGp91yOW6Ff0ERARKfAdS1NGRF3Xgd7P0YLHwXwm7PN1TvOYFYlXKkffdkwP2CPOf3pCHSnKSEDK0adcGkTcqY0Hfr2cm9gXHV5nw+rSBNjQhSjE35RhIMYagLM/mtKk+MVOTkSrMN4+gyZhcFVGAxFp162vFoEeYlJVySxwb4Eu9HzxYD8fIZNaY6XE4V2uY2+FKMdJUhgoBPligcr3PM3upWsrSNDzHVYDn9Is+89SbmxNrAq/dfpXC+Na01/WE3bp4BM8abvtjGUcUeiIjGdBdQ8EFVjVg2tTwbkDre4r+ImL/QiTBDTZbBgafG1964bKLt/4yxis3/qn0j8DeVveUV7qn1vBfYwNztps//SYHzIN6EL5p/GW9dggwVdlsLfCC9ZvVJE5ZbtbyBC7x1UDYeEkxUH8w==; 5:bDZjFNakF53FhOJGQr/SlqdC0H9u0v3vGuagh0iXUWqLJ4FE5Wa2PC2ahOzQP0PBmyZOiyKc1G5Xj5tDIdQuHuG8wFA0DBHZaRW4xMuNZmZ0ZnpICb51fuDZODk5mnoDPrfdflffrIs6tndIqAqNKjq7xQ1tP7iD3KUFpDbzrxY=; 7:QCJdpE/83F5k2/vE5lEAwxssC2QxPn5uBBLIferzNd4Tsi3+pXtdfMMtQ8YvKatqjn+EEUnIp9K3V7DeUA59EZgPWv17owlaUfKUnHMLZetp6QWNzt6K88xyw+HT2n1eYvEEjQntcdsU1OQesgU4YqFPlF/JLYF6gSJsj4ZxhCIHoqWJUOOfSnQWheDH2b63m0e+T/2RPcVf2652mJg/pkSeObIUZGXaaWdMYta0UL0lnrGFx0NI0AbYqK+fylsZ
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 1380c09d-9c89-4c97-2908-08d5ee68c434
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600067)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB2734; 
x-ms-traffictypediagnostic: VI1PR0801MB2734:
x-microsoft-antispam-prvs: <VI1PR0801MB27346017ECA8FBF5A021278FFA510@VI1PR0801MB2734.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(223705240517415)(788757137089)(21748063052155); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231311)(944501410)(52105095)(10201501046)(3002001)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123558120)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB2734; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB2734; 
x-forefront-prvs: 073966E86B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39860400002)(376002)(396003)(136003)(346002)(189003)(199004)(40434004)(53754006)(790700001)(256004)(5024004)(14444005)(26005)(81156014)(3846002)(81166006)(8676002)(6506007)(2501003)(25786009)(6116002)(450100002)(8936002)(5250100002)(102836004)(33656002)(105586002)(106356001)(486006)(2906002)(53936002)(561944003)(66066001)(74316002)(476003)(186003)(2900100001)(7736002)(316002)(5660300001)(68736007)(110136005)(14454004)(97736004)(9686003)(55016002)(99286004)(54896002)(478600001)(6306002)(6436002)(72206003)(7696005)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB2734; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 70uBVtYLMiDU437B6u9Y8yZn6rPiWd3qFt5DxeX9BsTf271qp9aghas84kmrzf4Jq7VslG9+dxxzNRCpQta6nDKvpu8F1MniEO8kYWaJRskc6uCJctBIs31GYaaUifzx7b4L7gvMQfezGiXjvtibFhx9krjUwCl3Q4+8ei4ZnrC8oPaes0sk2pxew7e+6c2VG+LvMY+tuFi1YyKqaxMpyTOsGQhnT8CMytv1eHsC6tiRimV+l8Z4WmWggx/w3fFzQV7YMKPFa0A8jKL7tahlsY8iTEhJ3SM6l2QqnGTOHhEboUWDjNPIl2YKSwbMAVbkRQ18Fejsd2A2FF/I/X3QGOJYh+iP9zCJv5p0i9vxlCQ=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB21120EA478D0783F9FCDDC0DFA510VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1380c09d-9c89-4c97-2908-08d5ee68c434
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2018 17:46:47.7594 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2734
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/i7XEocGxrXU2RrFwGW7zni1434E>
Subject: [OAUTH-WG] Progressing the HTTP parameter encoding for OAuth PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 17:47:06 -0000

--_000_VI1PR0801MB21120EA478D0783F9FCDDC0DFA510VI1PR0801MB2112_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

after several discussions we believe that we now have a proposal for moving=
 forward on this topic.
We plan to update the expired draft <draft-ietf-oauth-pop-key-distribution-=
03> and
(1) remove the audience parameter and replace it with a separately-specifie=
d resource parameter,
(2) remove the alg parameter,
(3) update the procedures for requesting and obtaining keying material,
(4) Synchronize with the ACE and WebRTC work to make sure that their use ca=
ses are appropriately covered.

Regarding (1): The meeting participants have decided to standardize an audi=
ence-alike parameter (in the form of a requested resource identifier) at th=
is weeks IETF OAuth meeting. For that purpose, working group adoption of dr=
aft-campbell-oauth-resource-indicators is under way.  Only a reference to t=
hat document will be needed.

Regarding (2): Removal of the alg parameter will simplify the document and =
does not appear to be necessary for the currently investigated use cases. T=
his assumption will have to be verified.

Regarding (3): Currently, the ACE-OAuth document and the <draft-ietf-oauth-=
pop-key-distribution-03> use different parameter names. Furthermore, those =
parameter names may be in conflict with other, already standardized paramet=
er names. Hence, some parameters may need to be renamed. The plan is to foc=
us on the following, minimal functionality only: server-side symmetric key =
generation and client-side public key registration to the AS. Furthermore, =
the encoding of the key transport will have to take the different token for=
mats and protocols into account.

This approach will allow the ACE and WebRTC work to reference the generic P=
oP key distribution document without having to specify their own duplicate =
functionality.

We are planning to update <draft-ietf-oauth-pop-key-distribution-03> next w=
eek to have something to review.

Ciao
Hannes & Rifaat
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB21120EA478D0783F9FCDDC0DFA510VI1PR0801MB2112_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">after several discussions we believe that we now hav=
e a proposal for moving forward on this topic.
<o:p></o:p></p>
<p class=3D"MsoNormal">We plan to update the expired draft &lt;draft-ietf-o=
auth-pop-key-distribution-03&gt; and
<o:p></o:p></p>
<p class=3D"MsoNormal">(1) remove the audience parameter and replace it wit=
h a separately-specified resource parameter,
<o:p></o:p></p>
<p class=3D"MsoNormal">(2) remove the alg parameter,<o:p></o:p></p>
<p class=3D"MsoNormal">(3) update the procedures for requesting and obtaini=
ng keying material,<o:p></o:p></p>
<p class=3D"MsoNormal">(4) Synchronize with the ACE and WebRTC work to make=
 sure that their use cases are appropriately covered.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding (1): The meeting participants have decided=
 to standardize an audience-alike parameter (in the form of a requested res=
ource identifier) at this weeks IETF OAuth meeting. For that purpose, worki=
ng group adoption of draft-campbell-oauth-resource-indicators
 is under way.&nbsp; Only a reference to that document will be needed.&nbsp=
; <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding (2): Removal of the alg parameter will sim=
plify the document and does not appear to be necessary for the currently in=
vestigated use cases. This assumption will have to be verified.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regarding (3): Currently, the ACE-OAuth document and=
 the &lt;draft-ietf-oauth-pop-key-distribution-03&gt; use different paramet=
er names. Furthermore, those parameter names may be in conflict with other,=
 already standardized parameter names. Hence,
 some parameters may need to be renamed. The plan is to focus on the follow=
ing, minimal functionality only: server-side symmetric key generation and c=
lient-side public key registration to the AS. Furthermore, the encoding of =
the key transport will have to take
 the different token formats and protocols into account.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">This approach will allow the ACE and WebRTC work to =
reference the generic PoP key distribution document without having to speci=
fy their own duplicate functionality.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We are planning to update &lt;draft-ietf-oauth-pop-k=
ey-distribution-03&gt; next week to have something to review.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes &amp; Rifaat<o:p></o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB21120EA478D0783F9FCDDC0DFA510VI1PR0801MB2112_--


From nobody Fri Jul 20 11:29:26 2018
Return-Path: <david@alkaline-solutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58A821310FE for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 11:29:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.436
X-Spam-Level: *
X-Spam-Status: No, score=1.436 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_SBL_CSS=3.335, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oYwtgbgWSbCn for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 11:29:11 -0700 (PDT)
Received: from alkaline-solutions.com (lithium5.alkaline-solutions.com [IPv6:2600:3c00::f03c:91ff:fe93:6974]) by ietfa.amsl.com (Postfix) with ESMTP id 5B4AE1310CC for <oauth@ietf.org>; Fri, 20 Jul 2018 11:29:11 -0700 (PDT)
Received: from [IPv6:2601:282:202:b210:f839:906b:e7ad:6493] (unknown [IPv6:2601:282:202:b210:f839:906b:e7ad:6493]) by alkaline-solutions.com (Postfix) with ESMTPSA id 51FE531544; Fri, 20 Jul 2018 18:29:10 +0000 (UTC)
From: David Waite <david@alkaline-solutions.com>
Message-Id: <BCB6D0DA-36EF-4E00-82E9-0187459544E4@alkaline-solutions.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_98EFA94F-90B0-4D31-9030-B49AC8290744"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Fri, 20 Jul 2018 12:29:09 -0600
In-Reply-To: <TY2PR01MB2297DBA5677C67441221DF54F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
Cc: Dick Hardt <dick.hardt@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
To: n-sakimura <n-sakimura@nri.co.jp>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com> <TY2PR01MB2297DBA5677C67441221DF54F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/NVGemREI9VJHGUKHAEwliJkYF6I>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 18:29:20 -0000

--Apple-Mail=_98EFA94F-90B0-4D31-9030-B49AC8290744
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On Jul 20, 2018, at 2:33 AM, n-sakimura <n-sakimura@nri.co.jp> wrote:
>=20
> I did not quite follow why CORS is relevant here. We are just talking =
about the client to server communication, and there are no embedded =
resources in the response. Could you kindly elaborate a little, please?=20=


Sure!  It is effectively an additional (complex) restriction on =
implementation/capabilities of CORS and the design of the resources.

There are five possible access results for a resource that come to mind:
1. Client does not have authorization but gets a (possibly limited) =
entity response
2. Client does not have authorization and is challenged
3. Client has authorization and gets a (possibly customized) entity =
response
4. Client has insufficient authorization and is challenged (e.g. for a =
new access token, possibly with more scopes)
5. Client has insufficient authorization and is refused access

The CORS policies returned for 1 and 3 may be different than 2 and 4, =
may be different for 5, and may come from different infrastructure (such =
as an authenticating reverse proxy =E2=80=9Cgateway=E2=80=9D). Note also =
that cases 1 and 3 may have a WWW-Authenticate header on the response, =
indicating that providing authorization may return a different entity =
response.

One way to handle remote access for all of these cases with commonality =
would be to expose the WWW-Authenticate header via the CORS policy.

With the Link header used as well, you would need to also expose the =
Link header in all of these cases (or at least 1-4). However, the Link =
header can return many relations beyond this one authorization use case, =
and you would be exposing those all-or-nothing.=20

You effectively lose the ability to regulate visibility of the Link =
header via CORS, and must resort to selective disclosure of headers as =
your mechanism of control (or serialize those links in another way such =
as within the content body, when an available option)

-DW

> =20
> For the second point, since it was discussed in the WG meeting =
yesterday, I will defer to that discussion.
> =20
> Best,=20
> =20
> Nat Sakimura
> =20
> =20
> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of David Waite
> Sent: Thursday, July 19, 2018 4:55 PM
> To: Dick Hardt <dick.hardt@gmail.com>
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
> =20
> Four comments.
> =20
> First: What is the rationale for including the parameters as Link =
headers rather than part of the WWW-Authenticate challenge, e.g.:
> =20
> WWW-Authenticate: Bearer realm=3D"example_realm",
>                              scope=3D"example_scope",
>                              error=3D=E2=80=9Cinvalid_token",
>     resource_uri=3D"https://api.example.com/resource =
<https://api.example.com/resource>",
>     =
oauth_server_metadata_uris=3D"https://as.example.com/.well-known/oauth-aut=
horization-server =
<https://as.example.com/.well-known/oauth-authorization-server> =
https://different-as.example.com/.well-known/oauth-authorization-server =
<https://different-as.example.com/.well-known/oauth-authorization-server>"=

> =20
>=20
> My understanding is that the RFC6750 auth-params are extensible (but =
not currently part of any managed registry.)
> =20
> One reason to go with this vs Link headers is CORS policy - exposing =
Link headers to a remote client must be done all or nothing as part of =
the CORS policy, and can=E2=80=99t be limited by the kind of link.
> =20
> Second: (retaining link format) Is there a reason the metadata =
location is specified the way it is? It seems like
> =20
> <https://as.example.com/.well-known/oauth-authorization-server =
<https://as.example.com/.well-known/oauth-authorization-server>>; =
rel=3D=E2=80=9Coauth_server_metadata_uri"
> =20
> should be
> =20
> <https://as.example.com <https://as.example.com/>>; =
rel=3D=E2=80=9Coauth_issuer"
> =20
> OAuth defines the location of metadata under the .well-known endpoint =
as a MUST. An extension of OAuth may choose from at least three =
different methods for handling extensions beyond this:
> 1. Add additional keys to the oauth-authorization-server metadata
> 2. Add additional resources to .well-known for clients to supporting =
their extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99=
 OAuth as a fallback.
> 3. Define their own parameter, such as rel=3D=E2=80=9Cspecialauth_issuer=
=E2=80=9D, potentially using a different mechanism for specifying =
metadata
> =20
> Given all this, it seems appropriate to only support specifying of =
metadata-supplying issuers, not metadata uris.
> =20
> Third: I have doubts of the usefulness of resource_uri in parallel to =
both the client requested URI and the Authorization =E2=80=9Crealm=E2=80=9D=
 parameter.
> =20
> As currently defined, the client would be the one enforcing (or =
possibly ignoring) static policy around resource URIs - that a resource =
URI is arbitrary except in that it must match the host (and =
scheme/port?) of the requested URI. The information on the requested URI =
by the client is not shared between the client and AS for it to do its =
own policy verification. It would seem better to send the client origin =
to the AS for it to do (potential) policy verification, rather than =
relying on clients to implement it for them based on static spec policy.
> =20
> The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as I would =
expect it to be the URI that was requested by the client. The purpose of =
this parameter is a bit confusing, as it is only defined as =E2=80=9CAn =
OAuth 2.0 Resource Endpoint specified in [RFC6750] section 3.2 - where =
the term doesn=E2=80=99t appear in 6750 and there does not appear to be =
a section 3.2 ;-)
> =20
> It seems that:
> a. If the resource_uri is a direct match for the URI requested for the =
client, it is redundant and should be dropped
>     (If the resource URI is *not* a direct match with the URI of the =
resource requested by the client, it might need a better name).
> b. If the resource URI is meant to provide a certain arbitrary =
grouping for applying tokens within the origin of the resource server, =
what is its value over the preexisting =E2=80=9C realm=E2=80=9D =
parameter?
> c. If the resource URI is meant to provide a way for an AS to allow =
resources to be independent, identified entities on a single origin - =
I=E2=80=99m unsure how a client would understand it is meant to treat =
these resource URIs as independent entities (e.g. be sure not to send =
bearer tokens minted for resource /entity1 to /entity2, or for that =
matter prevent /entity1 from requesting tokens for /entity2).
> =20
> Admittedly based on not fully understanding the purpose of this =
parameter, it seems to me there exists a simpler flow which better =
leverages the existing Authentication mechanism of HTTP.=20
> =20
> A request would fail due to an invalid or missing token for the realm =
at the origin, and and the client would make a request to the issuer =
including the origin of the requested resource as a parameter. Any other =
included parameters specified by the WWW-Authenticate challenge =
understood by the client (such as =E2=80=9Cscope=E2=80=9D) would also be =
applied to this request.
> =20
> Normal authorization grant flow would then happen (as this is the only =
grant type supported by RFC6750). Once the access token is acquired by =
the client, the client associates that token with the =E2=80=9Crealm=E2=80=
=9D parameter given in the initial challenge by the resource server =
origin. Likewise, the =E2=80=98aud=E2=80=99 of the token as returned by =
a token introspection process would be the origin of the resource =
server.
> =20
> It seems any more complicated protected resource groupings on a =
resource server would need a client to understand the structure of the =
resource server, and thus fetch some sort of resource server metadata.
> =20
> Fourth and finally: Is the intention to eventually recommend token =
binding here? Token binding as a requirement across clients, resources, =
and the authorization servers would isolate tokens to only being =
consumed within an origin. This would actually make =
redundant/supplemental the AS additions defined within this spec =
(resource/origin request parameter, =E2=80=98aud=E2=80=99 introspection =
response member)
> =20
> -DW
>=20
>=20
> On Jun 12, 2018, at 1:28 PM, Dick Hardt <dick.hardt@gmail.com =
<mailto:dick.hardt@gmail.com>> wrote:
> =20
> Hey OAuth WG
> =20
> I have worked with Nat and Brian to merge our concepts and those are =
captured in the updated draft.
> =20
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/ =
<https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/>
> =20
> We are hopeful the WG will adopt this draft as a WG document.
> =20
> Any comments and feedback are welcome!
> =20
> /Dick
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth =
<https://www.ietf.org/mailman/listinfo/oauth>

--Apple-Mail=_98EFA94F-90B0-4D31-9030-B49AC8290744
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Jul 20, 2018, at 2:33 AM, n-sakimura &lt;<a =
href=3D"mailto:n-sakimura@nri.co.jp" =
class=3D"">n-sakimura@nri.co.jp</a>&gt; wrote:</div><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><br class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">I =
did not quite follow why CORS is relevant here. We are just talking =
about the client to server communication, and there are no embedded =
resources in the response. Could you kindly elaborate a little, =
please?<span =
class=3D"Apple-converted-space">&nbsp;</span></span></div></div></div></bl=
ockquote><div><br class=3D""></div></div><div>Sure! &nbsp;It is =
effectively an additional (complex) restriction on =
implementation/capabilities of CORS and the design of the =
resources.</div><div><br class=3D""></div><div>There are five possible =
access results for a resource that come to mind:</div><div>1. Client =
does not have authorization but gets a (possibly limited) entity =
response</div><div>2. Client does not have authorization and is =
challenged</div><div>3. Client has authorization and gets a (possibly =
customized) entity response</div><div>4. Client has insufficient =
authorization and is challenged (e.g. for a new access token, possibly =
with more scopes)</div><div>5. Client has insufficient authorization and =
is refused access</div><div><br class=3D""></div><div>The CORS policies =
returned for 1 and 3 may be different than 2 and 4, may be different for =
5, and may come from different infrastructure (such as an authenticating =
reverse proxy =E2=80=9Cgateway=E2=80=9D). Note also that cases 1 and 3 =
may have a WWW-Authenticate header on the response, indicating that =
providing authorization may return a different entity =
response.</div><div><br class=3D""></div><div>One way to handle remote =
access for all of these cases with commonality would be to expose the =
WWW-Authenticate header via the CORS policy.</div><div><br =
class=3D""></div><div>With the Link header used as well, you would need =
to also expose the Link header in all of these cases (or at least 1-4). =
However, the Link header can return many relations beyond this one =
authorization use case, and you would be exposing those =
all-or-nothing.&nbsp;</div><div><br class=3D""></div><div>You =
effectively lose the ability to regulate visibility of the Link header =
via CORS, and must resort to selective disclosure of headers as your =
mechanism of control (or serialize those links in another way such as =
within the content body, when an available option)</div><div><br =
class=3D""></div><div>-DW</div><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D"WordSection1" =
style=3D"page: WordSection1; caret-color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant-caps: =
normal; font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span style=3D"font-family: =
Arial, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">For =
the second point, since it was discussed in the WG meeting yesterday, I =
will defer to that discussion.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-family: Arial, =
sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-family: Arial, =
sans-serif;" class=3D"">Best,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-family: Arial, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">Nat =
Sakimura<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div class=3D""><div =
style=3D"border-style: solid none none; border-top-width: 1pt; =
border-top-color: rgb(225, 225, 225); padding: 3pt 0cm 0cm;" =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><b class=3D"">From:</b><span=
 class=3D"Apple-converted-space">&nbsp;</span>OAuth [<a =
href=3D"mailto:oauth-bounces@ietf.org" =
class=3D"">mailto:oauth-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b class=3D"">On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>David Waite<br =
class=3D""><b class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, July 19, 2018 =
4:55 PM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Dick Hardt &lt;<a =
href=3D"mailto:dick.hardt@gmail.com" =
class=3D"">dick.hardt@gmail.com</a>&gt;<br class=3D""><b =
class=3D"">Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" class=3D"">oauth@ietf.org</a><br =
class=3D""><b class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] updated =
Distributed OAuth ID<o:p class=3D""></o:p></div></div></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Four comments.<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">First: What is the rationale for =
including the parameters as Link headers rather than part of the =
WWW-Authenticate challenge, e.g.:<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">WWW-Authenticate: Bearer realm=3D"example_realm",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;scope=3D"example_scope",<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;error=3D=E2=80=9Cinvalid_token",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; resource_uri=3D"<a =
href=3D"https://api.example.com/resource" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">https://api.example.com/resource</a>",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; oauth_server_metadata_uris=3D"<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://different-as.example.com/.well-known/oauth-authorization-s=
erver" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://different-as.example.com/.well-known/oauth-authorizatio=
n-server</a>"<o:p class=3D""></o:p></div></div><p class=3D"MsoNormal" =
style=3D"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p class=3D"">&nbsp;</o:p></p></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">My understanding is that the RFC6750 =
auth-params are extensible (but not currently part of any managed =
registry.)<o:p class=3D""></o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">One reason to go with this vs Link headers is CORS policy - =
exposing Link headers to a remote client must be done all or nothing as =
part of the CORS policy, and can=E2=80=99t be limited by the kind of =
link.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Second: (retaining link format) Is there a reason the =
metadata location is specified the way it is? It seems like<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&lt;<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a>&gt;; rel=3D=E2=80=9Coauth_server_metadata_uri"<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">should be<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&lt;<a =
href=3D"https://as.example.com/" style=3D"color: purple; =
text-decoration: underline;" class=3D"">https://as.example.com</a>&gt;; =
rel=3D=E2=80=9Coauth_issuer"<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">OAuth defines the location of metadata under the .well-known =
endpoint as a MUST. An extension of OAuth may choose from at least three =
different methods for handling extensions beyond this:<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">1. Add additional keys to the oauth-authorization-server =
metadata<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">2. Add additional resources to =
.well-known for clients to supporting their extensions to attempt to =
resolve, treating =E2=80=98regular=E2=80=99 OAuth as a fallback.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">3. Define their own parameter, such as =
rel=3D=E2=80=9Cspecialauth_issuer=E2=80=9D, potentially using a =
different mechanism for specifying metadata<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Given all this, it seems appropriate to =
only support specifying of metadata-supplying issuers, not metadata =
uris.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Third: I have doubts of the usefulness of resource_uri in =
parallel to both the client requested URI and the Authorization =
=E2=80=9Crealm=E2=80=9D parameter.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">As currently defined, the client would =
be the one enforcing (or possibly ignoring) static policy around =
resource URIs - that a resource URI is arbitrary except in that it must =
match the host (and scheme/port?) of the requested URI. The information =
on the requested URI by the client is not shared between the client and =
AS for it to do its own policy verification. It would seem better to =
send the client origin to the AS for it to do (potential) policy =
verification, rather than relying on clients to implement it for them =
based on static spec policy.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as =
I would expect it to be the URI that was requested by the client. The =
purpose of this parameter is a bit confusing, as it is only defined as =
=E2=80=9CAn OAuth 2.0 Resource Endpoint specified in [RFC6750] section =
3.2 - where the term doesn=E2=80=99t appear in 6750 and there does not =
appear to be a section 3.2 ;-)<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">It seems that:<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">a. If the resource_uri is =
a direct match for the URI requested for the client, it is redundant and =
should be dropped<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; (If the resource URI is =
*not* a direct match with the URI of the resource requested by the =
client, it might need a better name).<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">b. If the resource URI is meant to provide a certain =
arbitrary grouping for applying tokens within the origin of the resource =
server, what is its value over the preexisting =E2=80=9C&nbsp;realm=E2=80=9D=
 parameter?<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">c. If the resource URI is meant to =
provide a way for an AS to allow resources to be independent, identified =
entities on a single origin - I=E2=80=99m unsure how a client would =
understand it is meant to treat these resource URIs as independent =
entities (e.g. be sure not to send bearer tokens minted for resource =
/entity1 to /entity2, or for that matter prevent /entity1 from =
requesting tokens for /entity2).<o:p class=3D""></o:p></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Admittedly based on not fully understanding the purpose of =
this parameter, it seems to me there exists a simpler flow which better =
leverages the existing Authentication mechanism of HTTP.&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">A request would fail due to an invalid =
or missing token for the realm at the origin, and and the client would =
make a request to the issuer including the origin of the requested =
resource as a parameter. Any other included parameters specified by the =
WWW-Authenticate challenge understood by the client&nbsp;(such as =
=E2=80=9Cscope=E2=80=9D) would also be applied to this request.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Normal authorization grant flow would =
then happen (as this is the only grant type supported by RFC6750). Once =
the access token is acquired by the client, the client associates that =
token with the =E2=80=9Crealm=E2=80=9D parameter given in the initial =
challenge by the resource server origin. Likewise, the =E2=80=98aud=E2=80=99=
 of the token as returned by a token introspection process would be the =
origin of the resource server.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">It seems any more complicated protected resource groupings on =
a resource server would need a client to understand the structure of the =
resource server, and thus fetch some sort of resource server =
metadata.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Fourth and finally: Is the intention to eventually recommend =
token binding here? Token binding as a requirement across clients, =
resources, and the authorization servers would isolate tokens to only =
being consumed within an origin. This would actually make =
redundant/supplemental the AS additions defined within this spec =
(resource/origin request parameter, =E2=80=98aud=E2=80=99 introspection =
response member)<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">-DW<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D""><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">On Jun 12, 2018, at 1:28 PM, Dick Hardt &lt;<a =
href=3D"mailto:dick.hardt@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D"">dick.hardt@gmail.com</a>&gt; =
wrote:<o:p class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Hey OAuth WG<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">I have worked with Nat and Brian to =
merge our concepts and those are captured in the updated draft.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/=
</a><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">We are hopeful the WG will adopt this draft as a WG =
document.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Any comments and feedback are welcome!<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">/Dick<o:p =
class=3D""></o:p></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">_______________________________________________<br =
class=3D"">OAuth mailing list<br class=3D""><a =
href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">OAuth@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/oauth</a></div></div></bl=
ockquote></div></div></div></div></blockquote></div><br =
class=3D""></body></html>=

--Apple-Mail=_98EFA94F-90B0-4D31-9030-B49AC8290744--


From nobody Fri Jul 20 11:39:52 2018
Return-Path: <david@alkaline-solutions.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C649D130DCE for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 11:39:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T4Zo6jdcBWCR for <oauth@ietfa.amsl.com>; Fri, 20 Jul 2018 11:39:46 -0700 (PDT)
Received: from alkaline-solutions.com (lithium5.alkaline-solutions.com [173.255.196.46]) by ietfa.amsl.com (Postfix) with ESMTP id CE853129385 for <oauth@ietf.org>; Fri, 20 Jul 2018 11:39:45 -0700 (PDT)
Received: from [IPv6:2601:282:202:b210:f839:906b:e7ad:6493] (unknown [IPv6:2601:282:202:b210:f839:906b:e7ad:6493]) by alkaline-solutions.com (Postfix) with ESMTPSA id CCC9B31544; Fri, 20 Jul 2018 18:39:44 +0000 (UTC)
From: David Waite <david@alkaline-solutions.com>
Message-Id: <248DB7BF-2964-42DE-8CD1-879D3DDE762C@alkaline-solutions.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6466AD47-9E70-4B5B-BD85-A9BAF3E9B36C"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Fri, 20 Jul 2018 12:39:44 -0600
In-Reply-To: <TY2PR01MB2297DBA5677C67441221DF54F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
Cc: Dick Hardt <dick.hardt@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
To: n-sakimura <n-sakimura@nri.co.jp>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <1AD25F21-4F76-41CA-96E8-6E09373D04E8@alkaline-solutions.com> <TY2PR01MB2297DBA5677C67441221DF54F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/QwIDrKl9rcPvjlXOU6VjtvkmmUQ>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2018 18:39:50 -0000

--Apple-Mail=_6466AD47-9E70-4B5B-BD85-A9BAF3E9B36C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

There is also existing software that expects to be able to act/respond =
based only on the WWW-Authenticate header. See

=
https://hc.apache.org/httpcomponents-client-4.5.x/httpclient/apidocs/org/a=
pache/http/auth/AuthScheme.html#processChallenge(org.apache.http.Header) =
<https://hc.apache.org/httpcomponents-client-4.5.x/httpclient/apidocs/org/=
apache/http/auth/AuthScheme.html#processChallenge(org.apache.http.Header)>=


-DW

> On Jul 20, 2018, at 2:33 AM, n-sakimura <n-sakimura@nri.co.jp> wrote:
>=20
> Hi David,=20
> =20
> Thanks for the comment, and sorry for the delay in my reply.
> =20
> Doing it with Web Linking [RFC8288]  has several advantages.
> =20
> It is standard based J It is just a matter of registering link =
relations to the IANA Link Relation Type Registry, and it is quite =
widely used.
> No or very little coding needed: Other than adding some HTTP server =
configuration, the rest stays the same as RFC6750.
> Standard interface: this kind of metadata is applicable not only for =
letting the client find the appropriate authorization server but for =
other metadata as well. Also, other endpoints as long as it is =
supporting the direct communication with the client, can provide =
relevant metadata with it without going through the client =
authorization.
> =20
> I did not quite follow why CORS is relevant here. We are just talking =
about the client to server communication, and there are no embedded =
resources in the response. Could you kindly elaborate a little, please?=20=

> =20
> For the second point, since it was discussed in the WG meeting =
yesterday, I will defer to that discussion.
> =20
> Best,=20
> =20
> Nat Sakimura
> =20
> =20
> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of David Waite
> Sent: Thursday, July 19, 2018 4:55 PM
> To: Dick Hardt <dick.hardt@gmail.com>
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
> =20
> Four comments.
> =20
> First: What is the rationale for including the parameters as Link =
headers rather than part of the WWW-Authenticate challenge, e.g.:
> =20
> WWW-Authenticate: Bearer realm=3D"example_realm",
>                              scope=3D"example_scope",
>                              error=3D=E2=80=9Cinvalid_token",
>     resource_uri=3D"https://api.example.com/resource =
<https://api.example.com/resource>",
>     =
oauth_server_metadata_uris=3D"https://as.example.com/.well-known/oauth-aut=
horization-server =
<https://as.example.com/.well-known/oauth-authorization-server> =
https://different-as.example.com/.well-known/oauth-authorization-server =
<https://different-as.example.com/.well-known/oauth-authorization-server>"=

> =20
>=20
> My understanding is that the RFC6750 auth-params are extensible (but =
not currently part of any managed registry.)
> =20
> One reason to go with this vs Link headers is CORS policy - exposing =
Link headers to a remote client must be done all or nothing as part of =
the CORS policy, and can=E2=80=99t be limited by the kind of link.
> =20
> Second: (retaining link format) Is there a reason the metadata =
location is specified the way it is? It seems like
> =20
> <https://as.example.com/.well-known/oauth-authorization-server =
<https://as.example.com/.well-known/oauth-authorization-server>>; =
rel=3D=E2=80=9Coauth_server_metadata_uri"
> =20
> should be
> =20
> <https://as.example.com <https://as.example.com/>>; =
rel=3D=E2=80=9Coauth_issuer"
> =20
> OAuth defines the location of metadata under the .well-known endpoint =
as a MUST. An extension of OAuth may choose from at least three =
different methods for handling extensions beyond this:
> 1. Add additional keys to the oauth-authorization-server metadata
> 2. Add additional resources to .well-known for clients to supporting =
their extensions to attempt to resolve, treating =E2=80=98regular=E2=80=99=
 OAuth as a fallback.
> 3. Define their own parameter, such as rel=3D=E2=80=9Cspecialauth_issuer=
=E2=80=9D, potentially using a different mechanism for specifying =
metadata
> =20
> Given all this, it seems appropriate to only support specifying of =
metadata-supplying issuers, not metadata uris.
> =20
> Third: I have doubts of the usefulness of resource_uri in parallel to =
both the client requested URI and the Authorization =E2=80=9Crealm=E2=80=9D=
 parameter.
> =20
> As currently defined, the client would be the one enforcing (or =
possibly ignoring) static policy around resource URIs - that a resource =
URI is arbitrary except in that it must match the host (and =
scheme/port?) of the requested URI. The information on the requested URI =
by the client is not shared between the client and AS for it to do its =
own policy verification. It would seem better to send the client origin =
to the AS for it to do (potential) policy verification, rather than =
relying on clients to implement it for them based on static spec policy.
> =20
> The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as I would =
expect it to be the URI that was requested by the client. The purpose of =
this parameter is a bit confusing, as it is only defined as =E2=80=9CAn =
OAuth 2.0 Resource Endpoint specified in [RFC6750] section 3.2 - where =
the term doesn=E2=80=99t appear in 6750 and there does not appear to be =
a section 3.2 ;-)
> =20
> It seems that:
> a. If the resource_uri is a direct match for the URI requested for the =
client, it is redundant and should be dropped
>     (If the resource URI is *not* a direct match with the URI of the =
resource requested by the client, it might need a better name).
> b. If the resource URI is meant to provide a certain arbitrary =
grouping for applying tokens within the origin of the resource server, =
what is its value over the preexisting =E2=80=9C realm=E2=80=9D =
parameter?
> c. If the resource URI is meant to provide a way for an AS to allow =
resources to be independent, identified entities on a single origin - =
I=E2=80=99m unsure how a client would understand it is meant to treat =
these resource URIs as independent entities (e.g. be sure not to send =
bearer tokens minted for resource /entity1 to /entity2, or for that =
matter prevent /entity1 from requesting tokens for /entity2).
> =20
> Admittedly based on not fully understanding the purpose of this =
parameter, it seems to me there exists a simpler flow which better =
leverages the existing Authentication mechanism of HTTP.=20
> =20
> A request would fail due to an invalid or missing token for the realm =
at the origin, and and the client would make a request to the issuer =
including the origin of the requested resource as a parameter. Any other =
included parameters specified by the WWW-Authenticate challenge =
understood by the client (such as =E2=80=9Cscope=E2=80=9D) would also be =
applied to this request.
> =20
> Normal authorization grant flow would then happen (as this is the only =
grant type supported by RFC6750). Once the access token is acquired by =
the client, the client associates that token with the =E2=80=9Crealm=E2=80=
=9D parameter given in the initial challenge by the resource server =
origin. Likewise, the =E2=80=98aud=E2=80=99 of the token as returned by =
a token introspection process would be the origin of the resource =
server.
> =20
> It seems any more complicated protected resource groupings on a =
resource server would need a client to understand the structure of the =
resource server, and thus fetch some sort of resource server metadata.
> =20
> Fourth and finally: Is the intention to eventually recommend token =
binding here? Token binding as a requirement across clients, resources, =
and the authorization servers would isolate tokens to only being =
consumed within an origin. This would actually make =
redundant/supplemental the AS additions defined within this spec =
(resource/origin request parameter, =E2=80=98aud=E2=80=99 introspection =
response member)
> =20
> -DW
>=20
>=20
> On Jun 12, 2018, at 1:28 PM, Dick Hardt <dick.hardt@gmail.com =
<mailto:dick.hardt@gmail.com>> wrote:
> =20
> Hey OAuth WG
> =20
> I have worked with Nat and Brian to merge our concepts and those are =
captured in the updated draft.
> =20
> https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/ =
<https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/>
> =20
> We are hopeful the WG will adopt this draft as a WG document.
> =20
> Any comments and feedback are welcome!
> =20
> /Dick
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth =
<https://www.ietf.org/mailman/listinfo/oauth>

--Apple-Mail=_6466AD47-9E70-4B5B-BD85-A9BAF3E9B36C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">There=
 is also existing software that expects to be able to act/respond based =
only on the WWW-Authenticate header. See<div class=3D""><br =
class=3D""></div><div class=3D""></div><div class=3D""><a =
href=3D"https://hc.apache.org/httpcomponents-client-4.5.x/httpclient/apido=
cs/org/apache/http/auth/AuthScheme.html#processChallenge(org.apache.http.H=
eader)" =
class=3D"">https://hc.apache.org/httpcomponents-client-4.5.x/httpclient/ap=
idocs/org/apache/http/auth/AuthScheme.html#processChallenge(org.apache.htt=
p.Header)</a></div><div class=3D""><br class=3D""></div><div =
class=3D"">-DW<br class=3D""><div><br class=3D""><blockquote type=3D"cite"=
 class=3D""><div class=3D"">On Jul 20, 2018, at 2:33 AM, n-sakimura =
&lt;<a href=3D"mailto:n-sakimura@nri.co.jp" =
class=3D"">n-sakimura@nri.co.jp</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-family: Arial, sans-serif;" class=3D"">Hi David,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-family: Arial, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" =
class=3D"">Thanks for the comment, and sorry for the delay in my =
reply.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" =
class=3D"">Doing it with Web Linking [RFC8288] &nbsp;has several =
advantages.<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><ol start=3D"1" type=3D"1" =
style=3D"margin-bottom: 0cm; margin-top: 0cm;" class=3D""><li =
class=3D"MsoListParagraph" style=3D"margin: 0cm 0cm 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><span style=3D"font-family: =
Arial, sans-serif;" class=3D"">It is standard based<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span =
style=3D"font-family: Wingdings;" class=3D"">J</span><span =
style=3D"font-family: Arial, sans-serif;" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span>It is just a matter of =
registering link relations to the IANA Link Relation Type Registry, and =
it is quite widely used.<o:p class=3D""></o:p></span></li><li =
class=3D"MsoListParagraph" style=3D"margin: 0cm 0cm 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;"><span style=3D"font-family: =
Arial, sans-serif;" class=3D"">No or very little coding needed: Other =
than adding some HTTP server configuration, the rest stays the same as =
RFC6750.<o:p class=3D""></o:p></span></li><li class=3D"MsoListParagraph" =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;"><span style=3D"font-family: Arial, sans-serif;" =
class=3D"">Standard interface: this kind of metadata is applicable not =
only for letting the client find the appropriate authorization server =
but for other metadata as well. Also, other endpoints as long as it is =
supporting the direct communication with the client, can provide =
relevant metadata with it without going through the client =
authorization.<o:p class=3D""></o:p></span></li></ol><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">I =
did not quite follow why CORS is relevant here. We are just talking =
about the client to server communication, and there are no embedded =
resources in the response. Could you kindly elaborate a little, =
please?<span class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-family: Arial, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">For =
the second point, since it was discussed in the WG meeting yesterday, I =
will defer to that discussion.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-family: Arial, =
sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-family: Arial, =
sans-serif;" class=3D"">Best,<span =
class=3D"Apple-converted-space">&nbsp;</span><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-family: Arial, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D"">Nat =
Sakimura<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-family: Arial, sans-serif;" class=3D""><o:p=
 class=3D"">&nbsp;</o:p></span></div><div class=3D""><div =
style=3D"border-style: solid none none; border-top-width: 1pt; =
border-top-color: rgb(225, 225, 225); padding: 3pt 0cm 0cm;" =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><b class=3D"">From:</b><span=
 class=3D"Apple-converted-space">&nbsp;</span>OAuth [<a =
href=3D"mailto:oauth-bounces@ietf.org" =
class=3D"">mailto:oauth-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b class=3D"">On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>David Waite<br =
class=3D""><b class=3D"">Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, July 19, 2018 =
4:55 PM<br class=3D""><b class=3D"">To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Dick Hardt &lt;<a =
href=3D"mailto:dick.hardt@gmail.com" =
class=3D"">dick.hardt@gmail.com</a>&gt;<br class=3D""><b =
class=3D"">Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" class=3D"">oauth@ietf.org</a><br =
class=3D""><b class=3D"">Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] updated =
Distributed OAuth ID<o:p class=3D""></o:p></div></div></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p class=3D"">&nbsp;</o:p></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Four comments.<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">First: What is the rationale for =
including the parameters as Link headers rather than part of the =
WWW-Authenticate challenge, e.g.:<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">WWW-Authenticate: Bearer realm=3D"example_realm",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;scope=3D"example_scope",<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;error=3D=E2=80=9Cinvalid_token",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; resource_uri=3D"<a =
href=3D"https://api.example.com/resource" style=3D"color: purple; =
text-decoration: underline;" =
class=3D"">https://api.example.com/resource</a>",<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp; oauth_server_metadata_uris=3D"<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"https://different-as.example.com/.well-known/oauth-authorization-s=
erver" style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://different-as.example.com/.well-known/oauth-authorizatio=
n-server</a>"<o:p class=3D""></o:p></div></div><p class=3D"MsoNormal" =
style=3D"margin: 0cm 0cm 12pt; font-size: 11pt; font-family: Calibri, =
sans-serif;"><o:p class=3D"">&nbsp;</o:p></p></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">My understanding is that the RFC6750 =
auth-params are extensible (but not currently part of any managed =
registry.)<o:p class=3D""></o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">One reason to go with this vs Link headers is CORS policy - =
exposing Link headers to a remote client must be done all or nothing as =
part of the CORS policy, and can=E2=80=99t be limited by the kind of =
link.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Second: (retaining link format) Is there a reason the =
metadata location is specified the way it is? It seems like<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&lt;<a =
href=3D"https://as.example.com/.well-known/oauth-authorization-server" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://as.example.com/.well-known/oauth-authorization-server</=
a>&gt;; rel=3D=E2=80=9Coauth_server_metadata_uri"<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">should be<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&lt;<a =
href=3D"https://as.example.com/" style=3D"color: purple; =
text-decoration: underline;" class=3D"">https://as.example.com</a>&gt;; =
rel=3D=E2=80=9Coauth_issuer"<o:p class=3D""></o:p></div></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">OAuth defines the location of metadata under the .well-known =
endpoint as a MUST. An extension of OAuth may choose from at least three =
different methods for handling extensions beyond this:<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">1. Add additional keys to the oauth-authorization-server =
metadata<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">2. Add additional resources to =
.well-known for clients to supporting their extensions to attempt to =
resolve, treating =E2=80=98regular=E2=80=99 OAuth as a fallback.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">3. Define their own parameter, such as =
rel=3D=E2=80=9Cspecialauth_issuer=E2=80=9D, potentially using a =
different mechanism for specifying metadata<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Given all this, it seems appropriate to =
only support specifying of metadata-supplying issuers, not metadata =
uris.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Third: I have doubts of the usefulness of resource_uri in =
parallel to both the client requested URI and the Authorization =
=E2=80=9Crealm=E2=80=9D parameter.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">As currently defined, the client would =
be the one enforcing (or possibly ignoring) static policy around =
resource URIs - that a resource URI is arbitrary except in that it must =
match the host (and scheme/port?) of the requested URI. The information =
on the requested URI by the client is not shared between the client and =
AS for it to do its own policy verification. It would seem better to =
send the client origin to the AS for it to do (potential) policy =
verification, rather than relying on clients to implement it for them =
based on static spec policy.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">The name =E2=80=9Cresource URI=E2=80=9D is also confusing, as =
I would expect it to be the URI that was requested by the client. The =
purpose of this parameter is a bit confusing, as it is only defined as =
=E2=80=9CAn OAuth 2.0 Resource Endpoint specified in [RFC6750] section =
3.2 - where the term doesn=E2=80=99t appear in 6750 and there does not =
appear to be a section 3.2 ;-)<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">It seems that:<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">a. If the resource_uri is =
a direct match for the URI requested for the client, it is redundant and =
should be dropped<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp; &nbsp; (If the resource URI is =
*not* a direct match with the URI of the resource requested by the =
client, it might need a better name).<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">b. If the resource URI is meant to provide a certain =
arbitrary grouping for applying tokens within the origin of the resource =
server, what is its value over the preexisting =E2=80=9C&nbsp;realm=E2=80=9D=
 parameter?<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">c. If the resource URI is meant to =
provide a way for an AS to allow resources to be independent, identified =
entities on a single origin - I=E2=80=99m unsure how a client would =
understand it is meant to treat these resource URIs as independent =
entities (e.g. be sure not to send bearer tokens minted for resource =
/entity1 to /entity2, or for that matter prevent /entity1 from =
requesting tokens for /entity2).<o:p class=3D""></o:p></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Admittedly based on not fully understanding the purpose of =
this parameter, it seems to me there exists a simpler flow which better =
leverages the existing Authentication mechanism of HTTP.&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">A request would fail due to an invalid =
or missing token for the realm at the origin, and and the client would =
make a request to the issuer including the origin of the requested =
resource as a parameter. Any other included parameters specified by the =
WWW-Authenticate challenge understood by the client&nbsp;(such as =
=E2=80=9Cscope=E2=80=9D) would also be applied to this request.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Normal authorization grant flow would =
then happen (as this is the only grant type supported by RFC6750). Once =
the access token is acquired by the client, the client associates that =
token with the =E2=80=9Crealm=E2=80=9D parameter given in the initial =
challenge by the resource server origin. Likewise, the =E2=80=98aud=E2=80=99=
 of the token as returned by a token introspection process would be the =
origin of the resource server.<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">It seems any more complicated protected resource groupings on =
a resource server would need a client to understand the structure of the =
resource server, and thus fetch some sort of resource server =
metadata.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Fourth and finally: Is the intention to eventually recommend =
token binding here? Token binding as a requirement across clients, =
resources, and the authorization servers would isolate tokens to only =
being consumed within an origin. This would actually make =
redundant/supplemental the AS additions defined within this spec =
(resource/origin request parameter, =E2=80=98aud=E2=80=99 introspection =
response member)<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">-DW<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D""><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">On Jun 12, 2018, at 1:28 PM, Dick Hardt &lt;<a =
href=3D"mailto:dick.hardt@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D"">dick.hardt@gmail.com</a>&gt; =
wrote:<o:p class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Hey OAuth WG<o:p =
class=3D""></o:p></div><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">I have worked with Nat and Brian to =
merge our concepts and those are captured in the updated draft.<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/" =
style=3D"color: purple; text-decoration: underline;" =
class=3D"">https://datatracker.ietf.org/doc/draft-hardt-oauth-distributed/=
</a><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">We are hopeful the WG will adopt this draft as a WG =
document.<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Any comments and feedback are welcome!<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">/Dick<o:p =
class=3D""></o:p></div></div></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">_______________________________________________<br =
class=3D"">OAuth mailing list<br class=3D""><a =
href=3D"mailto:OAuth@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D"">OAuth@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">https://www.ietf.org/mailman/listinfo/oauth</a></div></div></bl=
ockquote></div></div></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_6466AD47-9E70-4B5B-BD85-A9BAF3E9B36C--


From nobody Sat Jul 21 08:33:11 2018
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E6BF130DCF for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 08:33:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3buEQ-DkQuZF for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 08:33:07 -0700 (PDT)
Received: from mail-qk0-x22b.google.com (mail-qk0-x22b.google.com [IPv6:2607:f8b0:400d:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C7AD130DD3 for <oauth@ietf.org>; Sat, 21 Jul 2018 08:33:06 -0700 (PDT)
Received: by mail-qk0-x22b.google.com with SMTP id b5-v6so7877423qkg.6 for <oauth@ietf.org>; Sat, 21 Jul 2018 08:33:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=message-id:mime-version:to:from:subject:date:importance:in-reply-to :references; bh=oQYYephaeJc8bpxIvzxCjJDBS11OyKJQigaW+oYHeLo=; b=Xd1N2ggfVa+AIJoY/lmiSaE8YDGvdXflIhGLkuhBIA1odkDvP18k4Alap71DbJwSZt /wN4BdgTOX4SNXCLGZrImgpwMeKHNMhXWdav6usQSy1XVLgwnbSqkrtthB81yb4pPRZq Lk7rXSn/oOItSKdQ84b3SiQXRzdb6PbL9nnJ+r/CAG3gan4MomFlTQ+hhq5cnEMNkto0 mLs/nRMnJBovOPscgu4rQ7Wg6dsIM3idl2J/1CTB0Lywh5toNA0G3uYm3sKUQaQYYaN5 lS6Z3u4gI4K1jyVBEIXshh6sv3mm2Y33P3PYpJqbvT6oa4uf+EX/A2iXtuFCaSR9m6iv QDnA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:mime-version:to:from:subject:date :importance:in-reply-to:references; bh=oQYYephaeJc8bpxIvzxCjJDBS11OyKJQigaW+oYHeLo=; b=ooTfaucbVNmAJwYKwsLnIY6m/Lv5n6khm68PVPFEqp0Hp4/fN3cNuF1liwemvVMQUL vG3hQGtr/3cOa7KYcFPeEb4JzkjIQYd9jWrspFbst0ewdKTlU0JEKNIB+B/Gzmd6ozFB Ron4OWdYG3OfexgMAL15fiJ7toybF3vHZ0aDj5zukAUkMPxycRLoHleQ0ipFceQx9KjN aFXguaO62HVSrhD08kkyCWb0gotfB/xRnR1rumgTFn12dp33gf1VkMHVr2/q/C9mH1Mp R42muptumE3/T1MdwPNQiArurG6WC/CzHefWQMtYndUOgUhaAJqdLCAqEzII89K1AyqL foJA==
X-Gm-Message-State: AOUpUlHk2lj/ilFDuq8N1rp2PNlP4DyptxjSZYHd0WerQtIuXHX4qGhM G5Z64Uknjxhc5r27bQiB03ZIrA==
X-Google-Smtp-Source: AAOMgpdEHSflDZPpwFYjF82I4uVDeEVfmTMglk+23rpjkLcFEQm2dNrQgQ02LhSFqM5NlBfUrV6X2Q==
X-Received: by 2002:a37:2966:: with SMTP id p99-v6mr5654478qkh.390.1532187184670;  Sat, 21 Jul 2018 08:33:04 -0700 (PDT)
Received: from ?IPv6:::ffff:10.254.210.216? ([192.252.136.182]) by smtp.gmail.com with ESMTPSA id 49-v6sm3253796qtu.0.2018.07.21.08.33.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 21 Jul 2018 08:33:03 -0700 (PDT)
Message-ID: <5b53522f.1c69fb81.a0309.45a1@mx.google.com>
MIME-Version: 1.0
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth <oauth@ietf.org>
From: John Bradley <ve7jtb@ve7jtb.com>
Date: Sat, 21 Jul 2018 11:33:01 -0400
Importance: normal
X-Priority: 3
In-Reply-To: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
References: <CAGL6epJ+4K-AV4yxfNBGWOiXzBYh_FBH0qXan0oT1MGhjErcJQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="_D838896F-CD72-4B5E-9B12-9587F5907550_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/0ma-DhcCcEnC1aXJ_n4D-i1kVYk>
Subject: Re: [OAUTH-WG] MTLS - IPR Disclosure
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 15:33:10 -0000

--_D838896F-CD72-4B5E-9B12-9587F5907550_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"


I am not aware of any IPR.
Sent from Mail for Windows 10

From: Rifaat Shekh-Yusef
Sent: Tuesday, July 17, 2018 10:06 AM
To: oauth
Subject: [OAUTH-WG] MTLS - IPR Disclosure

Authors,

As part of the write-up for the OAuth MTLS document, we need an IPR disclos=
ure from all of you..

Are you aware of any IPR related to the following OAuth MTLS document?
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/

Regards,



--_D838896F-CD72-4B5E-9B12-9587F5907550_
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" xmlns:w=3D"urn:sc=
hemas-microsoft-com:office:word" xmlns:m=3D"http://schemas.microsoft.com/of=
fice/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta ht=
tp-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta name=
=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style></head><body lang=3DEN-US link=3Dblue vlink=3D"#954F72"><div cla=
ss=3DWordSection1><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoN=
ormal>I am not aware of any IPR.</p><p class=3DMsoNormal>Sent from <a href=
=3D"https://go.microsoft.com/fwlink/?LinkId=3D550986">Mail</a> for Windows =
10</p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div style=3D'mso-element:p=
ara-border-div;border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in=
 0in 0in'><p class=3DMsoNormal style=3D'border:none;padding:0in'><b>From: <=
/b><a href=3D"mailto:rifaat.ietf@gmail.com">Rifaat Shekh-Yusef</a><br><b>Se=
nt: </b>Tuesday, July 17, 2018 10:06 AM<br><b>To: </b><a href=3D"mailto:oau=
th@ietf.org">oauth</a><br><b>Subject: </b>[OAUTH-WG] MTLS - IPR Disclosure<=
/p></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMso=
Normal>Authors,</p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></d=
iv><div><p class=3DMsoNormal>As part of the write-up for the OAuth MTLS doc=
ument, we need an IPR disclosure from all of you..</p></div><div><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Are you a=
ware of any IPR related to the following OAuth MTLS document?</p></div><div=
><p class=3DMsoNormal><a href=3D"https://datatracker.ietf.org/doc/draft-iet=
f-oauth-mtls/">https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/</a><=
/p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=
=3DMsoNormal>Regards,</p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p>=
</p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>=

--_D838896F-CD72-4B5E-9B12-9587F5907550_--


From nobody Sat Jul 21 09:34:45 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D329130DFF for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:34:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 63Tfeluk8H2N for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:34:39 -0700 (PDT)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF88712F1A2 for <oauth@ietf.org>; Sat, 21 Jul 2018 09:34:38 -0700 (PDT)
Received: from [80.187.120.149] (helo=[10.150.89.103]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fguq3-0005WK-8N; Sat, 21 Jul 2018 18:34:35 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-7573F82E-E1A9-40D4-9180-1230D213FB57; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPad Mail (15F79)
In-Reply-To: <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com>
Date: Sat, 21 Jul 2018 18:34:34 +0200
Cc: Filip Skokan <panva.ip@gmail.com>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <62C4BE6B-5E04-4E93-8083-A6D0895F2740@lodderstedt.net>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com> <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/LeQ9sXi2KjWMuT-NqhjDo2K12eM>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 16:34:43 -0000

--Apple-Mail-7573F82E-E1A9-40D4-9180-1230D213FB57
Content-Type: multipart/alternative;
	boundary=Apple-Mail-82A14C77-EEEA-4B66-B07C-112035795D37
Content-Transfer-Encoding: 7bit


--Apple-Mail-82A14C77-EEEA-4B66-B07C-112035795D37
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Brian,

> Am 20.07.2018 um 16:18 schrieb Brian Campbell <bcampbell@pingidentity.com>=
:
>=20
> The current draft does allow multiple "resource" parameters. However, ther=
e seemed to be consensus in the WG meeting yesterday that only a single "res=
ource" parameter was preferable

I think this makes sense for the token request. This allows the AS to audien=
ce restrict and token bind the access token to a single resource server URL.=


> and that a client could obtain an access token per resource (likely using a=
 refresh token).

I think the refresh token may represent the overall grant whereas the token r=
equest may issue an access token representing the whole or a subset of the o=
verall grant.

The question is what this means with respect to the scope. I assume scope va=
lues are typically bound to a certain resource service. For example, =E2=80=9C=
openid email mediacloud#read emailservice#read=E2=80=9D would match to permi=
ssion on a OpenID OP, a private cloud and an email service. I therefore woul=
d suggest the AS may filter the scope down to the values applicable to the r=
esource server for which the access token is being minted.

Another question relates to the applicable resource URIs. Do you envision an=
y way to constraint the resource URIs for which an access token might be cre=
ated for a particular grant? My feeling is the resource owner should have a c=
hance to consent or not in order to prevent the client to access resource se=
rvers the resource owner does not want it to do so.

> I'm personally sympathetic to that point. But maybe it's too restrictive. I=
 would like to see some more text about the complexity implications of multi=
ple "resource" parameters and perhaps some discouragement of doing so.

As stated above, I=E2=80=99m fine with a single parameter. I could provide s=
ome text on how the resource parameter could govern the AS behavior in case o=
f code and refresh token grant.

> I believe logical names are more potentially useful in an STS framework li=
ke token exchange but should be out of scope for this work.

Are you referring to logical resource names?

kind regards,
Torsten.

>  =20
>=20
>=20
>=20
>=20
>=20
>=20
>=20
>> On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan <panva.ip@gmail.com> wrote:=

>> Hi Torsten,
>>=20
>> > Multiple "resource" parameters may be used to indicate that the issued t=
oken is intended to be used at multiple resource servers.
>>=20
>> That's already in. Furthermore what about logical names for target servic=
es? Like was added in -03 of token exchange?
>>=20
>> Best,
>> Filip Skokan
>>=20
>>=20
>>> On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <torsten@lodderstedt=
.net> wrote:
>>> I support adoption of this document.
>>>=20
>>> I would like to point out (again) a single resource is not sufficient fo=
r most use cases I implemented in the last couple if years. I=E2=80=98m advo=
cating for enhancing the draft to support multiple resources and a clear def=
inition of the relationship between resource(s) and scope.
>>>=20
>>>> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>>>>=20
>>>> +1
>>>>=20
>>>> =20
>>>>=20
>>>> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of Brian Campbell=

>>>> Sent: Friday, July 20, 2018 7:42 AM
>>>> To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
>>>> Cc: oauth <oauth@ietf.org>
>>>> Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for O=
Auth 2.0"
>>>>=20
>>>> =20
>>>>=20
>>>> I support adoption of this document.
>>>>=20
>>>> =20
>>>>=20
>>>> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.=
com> wrote:
>>>>=20
>>>> Hi all,
>>>>=20
>>>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0=
' document
>>>> following the positive call for adoption at the Montreal IETF meeting.
>>>>=20
>>>> Here is the document:
>>>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02=

>>>>=20
>>>> Please let us know by August 2nd whether you accept / object to the
>>>> adoption of this document as a starting point for work in the OAuth
>>>> working group.
>>>>=20
>>>> Regards,
>>>> Rifaat
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>> =20
>>>>=20
>>>>=20
>>>> CONFIDENTIALITY NOTICE: This email may contain confidential and privile=
ged material for the sole use of the intended recipient(s). Any review, use,=
 distribution or disclosure by others is strictly prohibited..  If you have r=
eceived this communication in error, please notify the sender immediately by=
 e-mail and delete the message and any file attachments from your computer. T=
hank you.
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
 material for the sole use of the intended recipient(s). Any review, use, di=
stribution or disclosure by others is strictly prohibited.  If you have rece=
ived this communication in error, please notify the sender immediately by e-=
mail and delete the message and any file attachments from your computer. Tha=
nk you.

--Apple-Mail-82A14C77-EEEA-4B66-B07C-112035795D37
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div><span></span></div><div><div></div><di=
v>Hi Brian,</div><div><br>Am 20.07.2018 um 16:18 schrieb Brian Campbell &lt;=
<a href=3D"mailto:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>=
&gt;:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>The c=
urrent draft does allow multiple "resource" parameters. However, there seeme=
d to be consensus in the WG meeting yesterday that only a single "resource" p=
arameter was preferable </div></div></div></blockquote><div><br></div><div>I=
 think this makes sense for the token request. This allows the AS to audienc=
e restrict and token bind the access token to a single resource server URL.<=
/div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>and that a cli=
ent could obtain an access token per resource (likely using a refresh token)=
. </div></div></div></blockquote><div><br></div><div>I think the refresh tok=
en may represent the overall grant whereas the token request may issue an ac=
cess token representing the whole or a subset of the overall grant.</div><di=
v><br></div><div>The question is what this means with respect to the scope. I=
 assume scope values are typically bound to a certain resource service. For e=
xample, =E2=80=9Copenid email mediacloud#read emailservice#read=E2=80=9D wou=
ld match to permission on a OpenID OP, a private cloud and an email service.=
 I therefore would suggest the AS may filter the scope down to the values ap=
plicable to the resource server for which the access token is being minted.<=
/div><div><br></div><div>Another question relates to the applicable resource=
 URIs. Do you envision any way to constraint the resource URIs for which an a=
ccess token might be created for a particular grant? My feeling is the resou=
rce owner should have a chance to consent or not in order to prevent the cli=
ent to access resource servers the resource owner does not want it to do so.=
</div><div><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>I'=
m personally sympathetic to that point. But maybe it's too restrictive. I wo=
uld like to see some more text about the complexity implications of multiple=
 "resource" parameters and perhaps some discouragement of doing so. </div></=
div></div></blockquote><div><br></div><div>As stated above, I=E2=80=99m fine=
 with a single parameter. I could provide some text on how the resource para=
meter could govern the AS behavior in case of code and refresh token grant.<=
/div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>I believe logi=
cal names are more potentially useful in an STS framework like token&nbsp;ex=
change but should be out of scope for this work. </div></div></div></blockqu=
ote><div><br></div>Are you referring to logical resource names?<div><br></di=
v><div>kind regards,</div><div>Torsten.</div><div><br><blockquote type=3D"ci=
te"><div><div dir=3D"ltr"><div>&nbsp; <br></div><div><br></div><div><br></di=
v><div><br></div><div><br></div><div><br></div><div><br></div></div><div cla=
ss=3D"gmail_extra"><br><div class=3D"gmail_quote">On Fri, Jul 20, 2018 at 3:=
43 AM, Filip Skokan <span dir=3D"ltr">&lt;<a href=3D"mailto:panva.ip@gmail.c=
om" target=3D"_blank">panva.ip@gmail.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex"><div dir=3D"ltr"><div>Hi Torsten,</div><div><br></div><d=
iv>&gt;&nbsp;Multiple "resource" parameters may be used to indicate that the=
 issued token is intended to be used at multiple resource servers.</div><div=
><br></div><div>That's already in. Furthermore what about logical names for t=
arget services? Like was added in -03 of token exchange?</div><br clear=3D"a=
ll"><div><div dir=3D"ltr" class=3D"m_477017653891901618gmail_signature">Best=
,<br><b>Filip Skokan</b></div></div><br></div><div class=3D"HOEnZb"><div cla=
ss=3D"h5"><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Fri, Jul 20, 20=
18 at 9:33 AM Torsten Lodderstedt &lt;<a href=3D"mailto:torsten@lodderstedt.=
net" target=3D"_blank">torsten@lodderstedt.net</a>&gt; wrote:<br></div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex"><div dir=3D"auto"><div></div><div>I support adoptio=
n of this document.</div><div><br></div><div>I would like to point out (agai=
n) a single resource is not sufficient for most use cases I implemented in t=
he last couple if years. I=E2=80=98m advocating for enhancing the draft to s=
upport multiple resources and a clear definition of the relationship between=
 resource(s) and scope.</div><div><br>Am 20.07.2018 um 08:20 schrieb n-sakim=
ura &lt;<a href=3D"mailto:n-sakimura@nri.co.jp" target=3D"_blank">n-sakimura=
@nri.co.jp</a>&gt;:<br><br></div><blockquote type=3D"cite"><div>






<div class=3D"m_477017653891901618m_1965793530906637557WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if">+1 <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if"><u></u>&nbsp;<u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@i=
etf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>] <b>On Beh=
alf Of
</b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" t=
arget=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for "Resource Indicators fo=
r OAuth 2.0"<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document. <u></u><u></u></=
p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef &=
lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0cm=
 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the 'Resource Indicators for OAuth 2.0' doc=
ument<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource-=
indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#1155=
cc">https://tools.ietf.org/html/<wbr>draft-campbell-oauth-resource-<wbr>indi=
cators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans-=
serif;color:#555555;border:none windowtext 1.0pt;padding:0cm">CONFIDENTIALIT=
Y NOTICE: This email may contain confidential and privileged material for th=
e sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibite=
d..&nbsp; If you have received this communication in error, please notify th=
e sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
__________<wbr>_________________</span><br><span>OAuth mailing list</span><b=
r><span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</=
a></span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a></span>=
<br></div></blockquote></div>______________________________<wbr>____________=
_____<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
</blockquote></div>
</div></div><br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:bas=
eline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-ui=
,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Cant=
arell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><span=
 style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:basel=
ine;background:transparent;font-family:proxima-nova-zendesk,system-ui,-apple=
-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,Ca=
ntarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"><font s=
ize=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidential and pr=
ivileged material for the sole use of the intended recipient(s). Any review,=
 use, distribution or disclosure by others is strictly prohibited.&nbsp; If y=
ou have received this communication in error, please notify the sender immed=
iately by e-mail and delete the message and any file attachments from your c=
omputer. Thank you.</font></span></i></div></blockquote></div></div></body><=
/html>=

--Apple-Mail-82A14C77-EEEA-4B66-B07C-112035795D37--

--Apple-Mail-7573F82E-E1A9-40D4-9180-1230D213FB57
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIFPjCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYxggO6MIIDtgIBATCBrTCBlzELMAkGA1UEBhMCR0Ix
GzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR
Q09NT0RPIENBIExpbWl0ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0
aW9uIGFuZCBTZWN1cmUgRW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHh
MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyMTE2MzQzNFow
IwYJKoZIhvcNAQkEMRYEFKaJSMEN/DIl3/XfuahKVvN2RdD5MIG+BgkrBgEEAYI3EAQxgbAwga0w
gZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh
bGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMT0wOwYDVQQDEzRDT01PRE8gUlNBIENs
aWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBAhEAkibUdwuYLa5iFmqSehID
lTCBwAYLKoZIhvcNAQkQAgsxgbCgga0wgZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVy
IE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVk
MT0wOwYDVQQDEzRDT01PRE8gUlNBIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVt
YWlsIENBAhEAkibUdwuYLa5iFmqSehIDlTANBgkqhkiG9w0BAQEFAASCAQCBjGvJVk4ZxVLjndif
QVn1T7TJd/W1+tFUjVSKHviVVt55N/oFzSkgOiu951SRVUzHpmPthXTS5mGe08vCAIupCcZLQW5C
3Au4wy15edE005xv/deP9B8pT5Mw4EaNneF/JHKVykT5t2gJPAQ5PkwsQK43AgkPD6q8Pbt90B0E
4YxjkwucAdQqMctiI+40cVz6eto8aGiBNubztSk7ZRVeWit9ddeYxxVXhSWMlB2FwzbYf8dtrahv
oHoZU2wOM+GiraA6dJaaIHPoTc7zElbRtAq/kGcERzZmkbptpnTy5yHKXqAztUk/lnN5RYTkOUJG
AXRkZcMO87XEps00UKKTAAAAAAAA
--Apple-Mail-7573F82E-E1A9-40D4-9180-1230D213FB57--


From nobody Sat Jul 21 09:40:21 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49F4D130E46 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:40:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZNCNuqaoLBIz for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:40:15 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BDB27130DFF for <oauth@ietf.org>; Sat, 21 Jul 2018 09:40:14 -0700 (PDT)
Received: from [80.187.120.149] (helo=[10.150.89.103]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fguvS-0000Ge-Lt; Sat, 21 Jul 2018 18:40:10 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-647604C8-5B33-4C22-9498-E9776A27D3FB; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPad Mail (15F79)
In-Reply-To: <CAD9ie-saxrBABtc6Z5AQLT9M0tk92HF7ATZBETPTaC=TnfstMw@mail.gmail.com>
Date: Sat, 21 Jul 2018 18:40:09 +0200
Cc: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>, Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <47B1C568-D395-42D7-B1CC-C7A718AECB89@lodderstedt.net>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com> <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com> <MW2PR00MB0300E556CAC7F285C11DB784F5510@MW2PR00MB0300.namprd00.prod.outlook.com> <CAD9ie-saxrBABtc6Z5AQLT9M0tk92HF7ATZBETPTaC=TnfstMw@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/K6dxJjFwL5ewLyJL4Jd3DZKb7os>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 16:40:20 -0000

--Apple-Mail-647604C8-5B33-4C22-9498-E9776A27D3FB
Content-Type: multipart/alternative;
	boundary=Apple-Mail-3681D98F-F012-4B30-BFB2-586B0569A6E6
Content-Transfer-Encoding: 7bit


--Apple-Mail-3681D98F-F012-4B30-BFB2-586B0569A6E6
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Dick,

> Am 20.07.2018 um 19:46 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> There are a few places where multiple resources could be used:
>=20
> One is in the code flow where it is desirable to optimize the user experie=
nce so that the user is granting authorization once, and not multiple times.=
=20
>=20

I agree. That=E2=80=99s the reason why I=E2=80=99m advocating multiple resou=
rce.

> The second is in the access token request, which leads to the third instan=
ce, which is in the access token. If an access token is being returned for e=
ach resource, then making a single request is simpler, it seems to complicat=
e the interface more.

I agree.

>=20
> If we want to have audience constrained access tokens, then it is safer to=
 have only one resource in the access token - otherwise each resource can us=
e the access token to access the other resources.

Yes and no. Yes because it=E2=80=99s safer to use tightly audience restricte=
d access tokens.

No because token binding or cert-bound access tokens can prevent abuse in su=
ch a case.

>=20
> All of these examples assume that it is a single AS. Supporting multiple A=
S in a single request seems super complicated and wrought with security and t=
rust issues.

I don=E2=80=99t see a use case for multiple AS (yet ;-).

kind regards,
Torsten.
>=20
>=20
>=20
>=20
>> On Fri, Jul 20, 2018 at 11:13 AM, Mike Jones <Michael.Jones=3D40microsoft=
.com@dmarc.ietf.org> wrote:
>> While I agree that a single requested resource is the common case, enough=
 people have spoken up with a need for multiple requested resources over the=
 years that I think everyone will be better served by leaving the ability to=
 specify multiple requested resources in the specification.
>>=20
>> =20
>>=20
>>                                                        -- Mike
>>=20
>> =20
>>=20
>> From: OAuth <oauth-bounces@ietf.org> On Behalf Of Brian Campbell
>> Sent: Friday, July 20, 2018 10:18 AM
>> To: Filip Skokan <panva.ip@gmail.com>
>>=20
>>=20
>> Cc: oauth <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OA=
uth 2.0"
>> =20
>>=20
>> The current draft does allow multiple "resource" parameters. However, the=
re seemed to be consensus in the WG meeting yesterday that only a single "re=
source" parameter was preferable and that a client could obtain an access to=
ken per resource  (likely using a refresh token). I'm personally sympathetic=
 to that point. But maybe it's too restrictive. I would like to see some mor=
e text about the complexity implications of multiple "resource" parameters a=
nd perhaps some discouragement of doing so. I believe logical names are more=
 potentially useful in an STS framework like token exchange but should be ou=
t of scope for this work. =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> =20
>>=20
>> On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan <panva.ip@gmail.com> wrote:=

>>=20
>> Hi Torsten,
>>=20
>> =20
>>=20
>> > Multiple "resource" parameters may be used to indicate that the issued t=
oken is intended to be used at multiple resource servers.
>>=20
>> =20
>>=20
>> That's already in. Furthermore what about logical names for target servic=
es? Like was added in -03 of token exchange?
>>=20
>>=20
>>=20
>> Best,
>> Filip Skokan
>>=20
>> =20
>>=20
>> =20
>>=20
>> On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <torsten@lodderstedt.=
net> wrote:
>>=20
>> I support adoption of this document.
>>=20
>> =20
>>=20
>> I would like to point out (again) a single resource is not sufficient for=
 most use cases I implemented in the last couple if years. I=E2=80=98m advoc=
ating for enhancing the draft to support multiple resources and a clear defi=
nition of the relationship between resource(s) and scope.
>>=20
>>=20
>> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>>=20
>> +1
>>=20
>> =20
>>=20
>> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of Brian Campbell
>> Sent: Friday, July 20, 2018 7:42 AM
>> To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
>> Cc: oauth <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OA=
uth 2.0"
>>=20
>> =20
>>=20
>> I support adoption of this document.
>>=20
>> =20
>>=20
>> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.co=
m> wrote:
>>=20
>> Hi all,
>>=20
>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0' d=
ocument
>> following the positive call for adoption at the Montreal IETF meeting.
>>=20
>> Here is the document:
>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>=20
>> Please let us know by August 2nd whether you accept / object to the
>> adoption of this document as a starting point for work in the OAuth
>> working group.
>>=20
>> Regards,
>> Rifaat
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> =20
>>=20
>>=20
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privilege=
d material for the sole use of the intended recipient(s). Any review, use, d=
istribution or disclosure by others is strictly prohibited..  If you have re=
ceived this communication in error, please notify the sender immediately by e=
-mail and delete the message and any file attachments from your computer. Th=
ank you.
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> =20
>>=20
>>=20
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privilege=
d material for the sole use of the intended recipient(s). Any review, use, d=
istribution or disclosure by others is strictly prohibited..  If you have re=
ceived this communication in error, please notify the sender immediately by e=
-mail and delete the message and any file attachments from your computer. Th=
ank you.
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-3681D98F-F012-4B30-BFB2-586B0569A6E6
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>Hi Dick,</div><div><br>Am 2=
0.07.2018 um 19:46 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail=
.com">dick.hardt@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><=
div><div dir=3D"ltr">There are a few places where multiple resources could b=
e used:<div><br></div><div>One is in the code flow where it is desirable to o=
ptimize the user experience so that the user is granting authorization once,=
 and not multiple times.&nbsp;</div><div><br></div></div></div></blockquote>=
<div><br></div>I agree. That=E2=80=99s the reason why I=E2=80=99m advocating=
 multiple resource.<div><br><blockquote type=3D"cite"><div><div dir=3D"ltr">=
<div>The second is in the access token request, which leads to the third ins=
tance, which is in the access token. If an access token is being returned fo=
r each resource, then making a single request is simpler, it seems to compli=
cate the interface more.</div></div></div></blockquote><div><br></div>I agre=
e.</div><div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div><br></=
div><div>If we want to have audience constrained access tokens, then it is s=
afer to have only one resource in the access token - otherwise each resource=
 can use the access token to access the other resources.</div></div></div></=
blockquote><div><br></div>Yes and no. Yes because it=E2=80=99s safer to use t=
ightly audience restricted access tokens.</div><div><br></div><div>No becaus=
e token binding or cert-bound access tokens can prevent abuse in such a case=
.</div><div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div><br></d=
iv><div>All of these examples assume that it is a single AS. Supporting mult=
iple AS in a single request seems super complicated and wrought with securit=
y and trust issues.</div></div></div></blockquote><div><br></div>I don=E2=80=
=99t see a use case for multiple AS (yet ;-).</div><div><br></div><div>kind r=
egards,</div><div>Torsten.<br><blockquote type=3D"cite"><div><div dir=3D"ltr=
"><div><br></div><div><br></div><div><br></div></div><div class=3D"gmail_ext=
ra"><br><div class=3D"gmail_quote">On Fri, Jul 20, 2018 at 11:13 AM, Mike Jo=
nes <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=3D40microsoft.com@=
dmarc.ietf.org" target=3D"_blank">Michael.Jones=3D40microsoft.com@dmarc.ietf=
.org</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-5558039706233506919WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">While I agree that a si=
ngle requested resource is the common case, enough people have spoken up wit=
h a need for multiple requested resources over the years that I think everyo=
ne will be better served by leaving
 the ability to specify multiple requested resources in the specification.<u=
></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>&nbsp;<u></u></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;<wbr>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>&nbsp;<u></u></s=
pan></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth &lt;<a href=3D"mailto:oauth-bounce=
s@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>&gt; <b>On Behalf Of=
 </b>
Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 10:18 AM<br>
<b>To:</b> Filip Skokan &lt;<a href=3D"mailto:panva.ip@gmail.com" target=3D"=
_blank">panva.ip@gmail.com</a>&gt;</p><div><div class=3D"h5"><br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for "Resource Indicators fo=
r OAuth 2.0"<u></u><u></u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">The current draft does allow multiple "resource" para=
meters. However, there seemed to be consensus in the WG meeting yesterday th=
at only a single "resource" parameter was preferable and that a client could=
 obtain an access token per resource
 (likely using a refresh token). I'm personally sympathetic to that point. B=
ut maybe it's too restrictive. I would like to see some more text about the c=
omplexity implications of multiple "resource" parameters and perhaps some di=
scouragement of doing so. I
 believe logical names are more potentially useful in an STS framework like t=
oken&nbsp;exchange but should be out of scope for this work. &nbsp;
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<p class=3D"MsoNormal">On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan &lt;<a h=
ref=3D"mailto:panva.ip@gmail.com" target=3D"_blank">panva.ip@gmail.com</a>&g=
t; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0in=
 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal">Hi Torsten,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&gt;&nbsp;Multiple "resource" parameters may be used t=
o indicate that the issued token is intended to be used at multiple resource=
 servers.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">That's already in. Furthermore what about logical nam=
es for target services? Like was added in -03 of token exchange?<u></u><u></=
u></p>
</div>
<p class=3D"MsoNormal"><br clear=3D"all">
<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">Best,<br>
<b>Filip Skokan</b><u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt &=
lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodd=
erstedt.net</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0in=
 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal">I support adoption of this document.<u></u><u></u></p=
>
</div>
<div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I would like to point out (again) a single resource i=
s not sufficient for most use cases I implemented in the last couple if year=
s. I=E2=80=98m advocating for enhancing the draft to support multiple resour=
ces and a clear definition of the relationship
 between resource(s) and scope.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
Am 20.07.2018 um 08:20 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimura@n=
ri.co.jp" target=3D"_blank">n-sakimura@nri.co.jp</a>&gt;:<u></u><u></u></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if">+1
</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-ser=
if">&nbsp;</span><u></u><u></u></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@i=
etf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>]
<b>On Behalf Of </b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" t=
arget=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oau=
th@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for "Resource Indicators fo=
r OAuth 2.0"<u></u><u></u></p>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document.
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef &=
lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0in=
 0in 0in 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bo=
ttom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the 'Resource Indicators for OAuth 2.0' doc=
ument<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource-=
indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#1155=
cc">https://tools.ietf.org/html/<wbr>draft-campbell-oauth-resource-<wbr>indi=
cators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal">&nbsp;<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans-=
serif;color:#555555;border:none windowtext 1.0pt;padding:0in">CONFIDENTIALIT=
Y NOTICE: This email may contain confidential and privileged material for th=
e sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibite=
d..&nbsp; If you have received this communication in error, please notify th=
e sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">______________________________<wbr>_________________<=
br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</div>
</blockquote>
</div>
<p class=3D"MsoNormal">______________________________<wbr>_________________<=
br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<wbr>listinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>&nbsp;<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans-=
serif;color:#555555;border:none windowtext 1.0pt;padding:0in">CONFIDENTIALIT=
Y NOTICE: This email may contain confidential and privileged material for th=
e sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibite=
d..&nbsp; If you have received this communication in error, please notify th=
e sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div></div></div>
</div>

<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" t=
arget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></div></body></html>=

--Apple-Mail-3681D98F-F012-4B30-BFB2-586B0569A6E6--

--Apple-Mail-647604C8-5B33-4C22-9498-E9776A27D3FB
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-647604C8-5B33-4C22-9498-E9776A27D3FB--


From nobody Sat Jul 21 09:49:13 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F012130DC4 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:49:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MP8OyvA-syQX for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:49:09 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.18.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2560A127333 for <oauth@ietf.org>; Sat, 21 Jul 2018 09:49:09 -0700 (PDT)
Received: from [80.187.120.149] (helo=[10.150.89.103]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgv47-0000Kn-0U; Sat, 21 Jul 2018 18:49:07 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-E12ECF2A-90C9-487C-BF96-94BC9F394B69; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPad Mail (15F79)
In-Reply-To: <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com>
Date: Sat, 21 Jul 2018 18:49:05 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/pjROkBHGmB9vtbOJgaEiiAvO1T0>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 16:49:12 -0000

--Apple-Mail-E12ECF2A-90C9-487C-BF96-94BC9F394B69
Content-Type: multipart/alternative;
	boundary=Apple-Mail-AA44DDF2-264D-4562-8CD5-3F3A7A6A046F
Content-Transfer-Encoding: 7bit


--Apple-Mail-AA44DDF2-264D-4562-8CD5-3F3A7A6A046F
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Dick,

Am 19.07.2018 um 15:46 schrieb Dick Hardt <dick.hardt@gmail.com>:

>> I think any scenario with multiple resource servers relying on the same A=
S for authorization where the client acts on behalf of the resource owner qu=
alifies for grant type code and distributed OAuth.=20
>>=20
>> Let=E2=80=99s assume a user wants to authorize a client for access to her=
 cloud storage, email account and contacts when setting app the respective a=
pp.
>=20
> Would you walk me through the user experience that happened for the client=
 to do discovery on these three resources? In other words, what did the user=
 do to get the client to call the resource and get back the 401 response?

I would assume the user enters the URLs or identifies the respective service=
 providers in the app (e.g. by entering her email address). The client then s=
ends an initial request as described in your draft and gets back the 401.

Doing so for several resources will give the client the AS URL for all invol=
ved resources. If the client compares the iss claims it will figure our all r=
esources are protected by the same AS and can authorize access via a single a=
uthz code grant flow.

kind regards,
Torsten.=

--Apple-Mail-AA44DDF2-264D-4562-8CD5-3F3A7A6A046F
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>Hi Dick,</div><div><br>Am 1=
9.07.2018 um 15:46 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail=
.com">dick.hardt@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><=
div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex"><div dir=3D"auto">I think any scenario wit=
h multiple resource servers relying on the same AS for authorization where t=
he client acts on behalf of the resource owner qualifies for grant type code=
 and distributed OAuth.&nbsp;<div><br></div><div>Let=E2=80=99s assume a user=
 wants to authorize a client for access to her cloud storage, email account a=
nd contacts when setting app the respective app.</div></div></blockquote><di=
v><br></div><div>Would you walk me through the user experience that happened=
 for the client to do discovery on these three resources? In other words, wh=
at did the user do to get the client to call the resource and get back the 4=
01 response?</div><div></div></div></blockquote><br><div>I would assume the u=
ser enters the URLs or identifies the respective service providers in the ap=
p (e.g. by entering her email address). The client then sends an initial req=
uest as described in your draft and gets back the 401.</div><div><br></div><=
div>Doing so for several resources will give the client the AS URL for all i=
nvolved resources. If the client compares the iss claims it will figure our a=
ll resources are protected by the same AS and can authorize access via a sin=
gle authz code grant flow.</div><div><br></div><div>kind regards,</div><div>=
Torsten.</div></body></html>=

--Apple-Mail-AA44DDF2-264D-4562-8CD5-3F3A7A6A046F--

--Apple-Mail-E12ECF2A-90C9-487C-BF96-94BC9F394B69
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-E12ECF2A-90C9-487C-BF96-94BC9F394B69--


From nobody Sat Jul 21 09:53:53 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 195A4130DC4 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:53:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.308
X-Spam-Level: 
X-Spam-Status: No, score=0.308 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_BL=0.01, RCVD_IN_MSPIKE_L3=2.899, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OzVnKZpXL9A7 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 09:53:49 -0700 (PDT)
Received: from smtprelay07.ispgateway.de (smtprelay07.ispgateway.de [134.119.228.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 705B6127333 for <oauth@ietf.org>; Sat, 21 Jul 2018 09:53:49 -0700 (PDT)
Received: from [80.187.120.149] (helo=[10.150.89.103]) by smtprelay07.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgv8c-0000iE-BP; Sat, 21 Jul 2018 18:53:46 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-8A4A1502-B77E-4B92-809A-94B29C196706; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPad Mail (15F79)
In-Reply-To: <670e70fd-d494-9153-9b41-5cab0eab0dd0@cozmanova.com>
Date: Sat, 21 Jul 2018 18:53:45 +0200
Cc: Phil Hunt <phil.hunt@oracle.com>, Rob Otto <robotto=40pingidentity.com@dmarc.ietf.org>, oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <69007A95-2BD2-4CF9-A6BB-0182F60E8D77@lodderstedt.net>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <CAAP42hAusd1vyAGFHTQ46FuODXFrUjEg6BaL7m3th25gy5RC=g@mail.gmail.com> <CA+k3eCQvb2D5NaDeSK1Fys2c8Sam46h2Q5FkpyVxM4Puo1VDdQ@mail.gmail.com> <CABh6VRHkwY-AUVmGPU3VM76a5p8--Gn=iCRmAzsKn-DcghXaLw@mail.gmail.com> <E25B09C9-936A-4CD6-B446-051804564C7B@oracle.com> <670e70fd-d494-9153-9b41-5cab0eab0dd0@cozmanova.com>
To: Mark Dobrinic <mdobrinic@cozmanova.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/0Bi-Bs2P_XgYMUAO9BCZ_J6ZIZk>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 16:53:52 -0000

--Apple-Mail-8A4A1502-B77E-4B92-809A-94B29C196706
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Mark,
> Am 20.07.2018 um 17:47 schrieb Mark Dobrinic <mdobrinic@cozmanova.com>:
>=20
> I +1 this,

thanks

>=20
> but at the same time, I'm wondering what happened with the argument that
> this should be solved by Token Exchange instead of Introspect?

We presented two use case in London, (1) providing evidence for the RS=E2=80=
=99s audit log and (2) providing/transforming tokens by a reverse proxy in f=
ront of a resource server.

The WG advised us to consider token exchange for (2) so the current draft on=
ly addresses (1).

kind regards,
Torsten.

>=20
> Cheers!
>=20
> Mark
>=20
>=20
>> On 20/07/18 17:39, Phil Hunt wrote:
>> +1 adoption
>>=20
>> I have always been concerned about clients doing introspection. Use of
>> jwt helps because responses further restricted rather than less (jwe).=20=

>>=20
>> Phil
>>=20
>> On Jul 20, 2018, at 7:25 AM, Rob Otto
>> <robotto=3D40pingidentity.com@dmarc.ietf.org
>> <mailto:robotto=3D40pingidentity.com@dmarc.ietf.org>> wrote:
>>=20
>>> I support this as well=20
>>>=20
>>> On Fri, 20 Jul 2018 at 15:22, Brian Campbell
>>> <bcampbell=3D40pingidentity.com@dmarc.ietf.org
>>> <mailto:40pingidentity.com@dmarc.ietf.org>> wrote:
>>>=20
>>>    +1
>>>=20
>>>    On Thu, Jul 19, 2018 at 1:51 PM, William Denniss
>>>    <wdenniss=3D40google.com@dmarc.ietf.org
>>>    <mailto:wdenniss=3D40google.com@dmarc..ietf.org>> wrote:
>>>=20
>>>        I support adoption of this document by the working group.
>>>=20
>>>=20
>>>        On Thu, Jul 19, 2018 at 10:43 AM, Rifaat Shekh-Yusef
>>>        <rifaat.ietf@gmail.com <mailto:rifaat.ietf@gmail.com>> wrote:
>>>=20
>>>            Hi all,
>>>=20
>>>            This is the call for adoption of the 'JWT Response for
>>>            OAuth Token Introspection' document following the
>>>            presentation by Torsten at the Montreal IETF meeting where
>>>            we didn't have a chance to do a call for adoption in the
>>>            meeting itself.
>>>=20
>>>            Here is presentation by Torsten:
>>>            https://datatracker.ietf.org/meeting/102/materials/slides-102=
-oauth-sessa-jwt-response-for-oauth-token-introspection-00
>>>=20
>>>            Here is the document:
>>>            https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-intro=
spection-response-01
>>>=20
>>>            Please let us know by August 2nd whether you accept /
>>>            object to the adoption of this document as a starting
>>>            point for work in the OAuth working group.
>>>=20
>>>            Regards,
>>>            Hannes & Rifaat
>>>=20
>>>            _______________________________________________
>>>            OAuth mailing list
>>>            OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>            https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>>        _______________________________________________
>>>        OAuth mailing list
>>>        OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>        https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>>    /CONFIDENTIALITY NOTICE: This email may contain confidential and
>>>    privileged material for the sole use of the intended recipient(s).
>>>    Any review, use, distribution or disclosure by others is strictly
>>>    prohibited...  If you have received this communication in error,
>>>    please notify the sender immediately by e-mail and delete the
>>>    message and any file attachments from your computer. Thank
>>>    you./_______________________________________________
>>>    OAuth mailing list
>>>    OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>    https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20
>>> --=20
>>> <https://www.pingidentity.com>Ping Identity
>>> <https://www.pingidentity.com>       =20
>>> Rob Otto   =20
>>> EMEA Field CTO/Solutions Architect   =20
>>> robertotto@pingidentity.com <mailto:robertotto@pingidentity.com>   =20
>>>=20
>>> c: +44 (0) 777 135 6092   =20
>>>=20
>>> Connect with us:    Glassdoor logo
>>> <https://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907=
.11,24.htm>
>>> LinkedIn logo <https://www.linkedin.com/company/21870> twitter logo
>>> <https://twitter.com/pingidentity>    facebook logo
>>> <https://www.facebook.com/pingidentitypage>    youtube logo
>>> <https://www.youtube.com/user/PingIdentityTV>    Google+ logo
>>> <https://plus.google.com/u/0/114266977739397708540> Blog logo
>>> <https://www.pingidentity.com/en/blog.html>   =20
>>>=20
>>> <https://www.gartner.com/doc/reprints?id=3D1-5423XKW&ct=3D180620&st=3Dsb=
>
>>>=20
>>> /CONFIDENTIALITY NOTICE: This email may contain confidential and
>>> privileged material for the sole use of the intended recipient(s). Any
>>> review, use, distribution or disclosure by others is strictly
>>> prohibited..  If you have received this communication in error, please
>>> notify the sender immediately by e-mail and delete the message and any
>>> file attachments from your computer. Thank you./
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-8A4A1502-B77E-4B92-809A-94B29C196706
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-8A4A1502-B77E-4B92-809A-94B29C196706--


From nobody Sat Jul 21 10:12:54 2018
Return-Path: <panva.ip@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F2DD130EF8 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 10:12:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V2Fy8A1nPB0W for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 10:12:43 -0700 (PDT)
Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AD53130E70 for <oauth@ietf.org>; Sat, 21 Jul 2018 10:12:43 -0700 (PDT)
Received: by mail-wr1-x430.google.com with SMTP id a3-v6so13994137wrt.2 for <oauth@ietf.org>; Sat, 21 Jul 2018 10:12:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:content-transfer-encoding:mime-version:date:subject:message-id :references:in-reply-to:to; bh=kt/axhcERk0sUpxEbr1OqkJJb/b19VlHj74FZOvot8E=; b=WO0uaOQ4MLN5g7+cjVXFScvvOkML6fQyrCo/MlzduZcJ2gSJLg4CwqXwKNWB4L6Fvf 2ANIfE26CDIFeLnJH65bbdPjZw80ZlDrqme52sTsi4Gk31WYWji07Gylx7EAxmRPvr16 ioUrFXaCk8hsIFNF3B9rnAaNZYq11X7VAeeg61fB1XoENEwVJniNLKgsGHuVSlE0fajQ u6hLuNUL1pMBsrxCkMJstmQ/sRMjTcBkIcIjKndv1jsJHq/3K5tesqTfdzWJ/2AJWySP OOjDKpyE4J4dQkNqrfW3KkAHKWZ2GCWMTMpxZGlB1of0uYpecobQi2dI+PxtDJo9Fh8K BRxQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version:date :subject:message-id:references:in-reply-to:to; bh=kt/axhcERk0sUpxEbr1OqkJJb/b19VlHj74FZOvot8E=; b=oINF4E1QU/Xz1iW5R4wRyPC57voy4mb3i/UDBkb7eZLVgCDHdFPhv8ebD4W/79fyZF pVEOYrH/STTvcJ/po8YvtoSe7bsAI2V4YPKsRUo9hFZFHMUovQfiEcPuSt1R04/i7WzY ZsKv3sJTOQPSErwKQXWQvcOYE19KKvhdI0sFEKKkq+ARHNfX4AeKH9ChuYxTHiOK6qSW FWQOnpTuVEYwkrMzOBasX7F9t0k7V4tO4M8RUj6IZF5t3GBl4boeiHNQ7Qf1thHI02in 60sM1QRfp2IPspaUWeroooZjve6mOcpq3Nq2KSVdVIG+P7wfEXMgFW8uzvY8RSVLx1Tu /mJQ==
X-Gm-Message-State: AOUpUlGouUKNrOozcCR1nC+ynhVODT+9ywcQQUiZp38IL5aKqYriwPrI nOL50FRxINRtfgA5sO7SQQqzt+E=
X-Google-Smtp-Source: AAOMgpd9Yrf1kSq8kjXpmOMiXerJa4i3umj9zLop+069nXs5q0tOzCgzg6rPMCXy6KGAlg3WJ3BG/g==
X-Received: by 2002:a5d:6103:: with SMTP id v3-v6mr4525740wrt.265.1532193161250;  Sat, 21 Jul 2018 10:12:41 -0700 (PDT)
Received: from [192.168.0.105] (214-77-239-109.cust.centrio.cz. [109.239.77.214]) by smtp.gmail.com with ESMTPSA id s16-v6sm4118021wrq.20.2018.07.21.10.12.40 for <oauth@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 21 Jul 2018 10:12:40 -0700 (PDT)
From: Filip Skokan <panva.ip@gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-290C889B-A7B8-4655-9F7D-A3E7B19F8700
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (1.0)
Date: Sat, 21 Jul 2018 19:12:40 +0200
Message-Id: <DABA7D9B-3D3C-4621-966F-FDF70A82F0A7@gmail.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
In-Reply-To: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com>
To: oauth <oauth@ietf.org>
X-Mailer: iPhone Mail (15G77)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/tE0vK2DoeM8bue5amDFFf5TyMjk>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 17:12:53 -0000

--Apple-Mail-290C889B-A7B8-4655-9F7D-A3E7B19F8700
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

I support the adoption or this document by the WG.=20

Filip Skokan

Odesl=C3=A1no z iPhonu

19. 7. 2018 v 19:43, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>:

> Hi all,
>=20
> This is the call for adoption of the 'JWT Response for OAuth Token Introsp=
ection' document following the presentation by Torsten at the Montreal IETF m=
eeting where we didn't have a chance to do a call for adoption in the meetin=
g itself.
>=20
> Here is presentation by Torsten:
> https://datatracker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-=
jwt-response-for-oauth-token-introspection-00
>=20
> Here is the document:
> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-resp=
onse-01
>=20
> Please let us know by August 2nd whether you accept / object to the adopti=
on of this document as a starting point for work in the OAuth working group.=

>=20
> Regards,
> Hannes & Rifaat
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-290C889B-A7B8-4655-9F7D-A3E7B19F8700
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto">I support the adoption or this document by t=
he WG.&nbsp;<div><br></div><div>Filip Skokan<br><br><div id=3D"AppleMailSign=
ature">Odesl=C3=A1no z&nbsp;iPhonu</div><div><br>19. 7. 2018 v&nbsp;19:43, R=
ifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifaat.ietf@g=
mail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"lt=
r"><div>Hi all,</div><div><br></div><div>This is the call for adoption of th=
e 'JWT Response for OAuth Token Introspection' document following the presen=
tation by Torsten at the Montreal IETF meeting where we didn't have a chance=
 to do a call for adoption in the meeting itself.</div><div><br></div><div>H=
ere is presentation by Torsten:</div><div><a href=3D"https://datatracker.iet=
f.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-for-oauth-to=
ken-introspection-00">https://datatracker.ietf.org/meeting/102/materials/sli=
des-102-oauth-sessa-jwt-response-for-oauth-token-introspection-00</a></div><=
div><br></div><div>Here is the document:</div><div><a href=3D"https://tools.=
ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01">https:/=
/tools.ietf.org/html/draft-lodderstedt-oauth-jwt-introspection-response-01</=
a></div><div><br></div><div>Please let us know by August 2nd whether you acc=
ept / object to the adoption of this document as a starting point for work i=
n the OAuth working group.</div><div><br></div><div>Regards,</div><div>Hanne=
s &amp; Rifaat</div></div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></div></body></html>=

--Apple-Mail-290C889B-A7B8-4655-9F7D-A3E7B19F8700--


From nobody Sat Jul 21 10:54:15 2018
Return-Path: <hans.zandbelt@zmartzone.eu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D56B130E15 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 10:54:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=zmartzone-eu.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jYZowdixOXWR for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 10:54:11 -0700 (PDT)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07356130DCF for <oauth@ietf.org>; Sat, 21 Jul 2018 10:54:10 -0700 (PDT)
Received: by mail-qt0-x229.google.com with SMTP id y19-v6so13061511qto.5 for <oauth@ietf.org>; Sat, 21 Jul 2018 10:54:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zmartzone-eu.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=beZKJpx5ygmyfZ4+9EeaYEcfgF2W8+CB6wuJyxPqS/0=; b=mk5IXdeaco9HJxtaJqCrHFVhzlVCnjOcMZyh5+BVfm9vs4ne9lvmLqrzboWDwmd3+P scIA058f6K2IKV9XsI8mipBveZhkA+gGndHI2BF6Yj8wgCnxbo026XGVNisptv0WelOt SUYJGdfh+fro9USA0Sg/u5Ex/ZixrkpRE+nkoqK1OGJxrYIMvwiKaDWO4OT0+WGSrijp m1NtLRH+HxLX1Ce0PlEaDhPj9BBnEdzb8SNrxpCpgC76zcEIk6pg7z+uJsBuuNSSUQLi FHUxh+1jV5AJb2itfPfgqlPhDXcy6QsE9semgorNQj8AwR3NHxjbc9oG/LcFTOm/waSM nKLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=beZKJpx5ygmyfZ4+9EeaYEcfgF2W8+CB6wuJyxPqS/0=; b=BQWxTUMss6v6/MUND65YQ4hO9TvKkdnjd3P052V58xcUxdsLYuOnUc16QD+mJ/aL77 B65wDFVwno38B6Cfkjlp9D7tqnC+uWVafpX0dUmaFnmkhJ1zmXpR1wddWN0JC7Il0Egy 5VfneJqo3ZXjcHL4Y5CNeAwsuGzZWZwFtVYmkageZ68d1E0RpfXhPREDkE8EcLkNLCRk qPq12JpH3FblN1ELiC/Z5foCD+I1jtEa4kUVWgKsWibWIhF33NoE6M5VX0sY4iuvMOpo VJXUIWRddqy30g8rwEsMOwHwoUxf545HQCDH/4js7zXfv/XuEFK/vGmmSH9Ueilwd7zD ZaVw==
X-Gm-Message-State: AOUpUlF677SRRTlXVAVX9fZaivT0SFhcWfzsc7qnSgeas6OOzwjB0A35 hFe7V/+gZ/nAZ4wwB6UXww/9zlmzNnjNNkxrjN4zEADh
X-Google-Smtp-Source: AAOMgpeXJjjRsGd6yYPM8c+2jekSbC/jGWk2EMbVkLml6IWvCT+TuS19L3F917Ma9Pl3XbaKWCoDR2LKqGFzV6m7qoE=
X-Received: by 2002:ac8:5343:: with SMTP id d3-v6mr6376831qto.141.1532195649922;  Sat, 21 Jul 2018 10:54:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:32e5:0:0:0:0:0 with HTTP; Sat, 21 Jul 2018 10:54:09 -0700 (PDT)
In-Reply-To: <DABA7D9B-3D3C-4621-966F-FDF70A82F0A7@gmail.com>
References: <CAGL6epJQ7qrdTv+RrNhuJ_GqKHzFRV=YDA1aswtTiE9NmK6LjQ@mail.gmail.com> <DABA7D9B-3D3C-4621-966F-FDF70A82F0A7@gmail.com>
From: Hans Zandbelt <hans.zandbelt@zmartzone.eu>
Date: Sat, 21 Jul 2018 19:54:09 +0200
Message-ID: <CA+iA6ujTUQpe=c_t9V7xZ-CqZeELifQoSL31FSpVuV3GZq+wUA@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000070b8d605718619a7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/DOO2RvLB7jdREwBVfFig37g1Bz0>
Subject: Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 17:54:14 -0000

--00000000000070b8d605718619a7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

+1

Hans.

On Sat, Jul 21, 2018 at 7:12 PM, Filip Skokan <panva.ip@gmail.com> wrote:

> I support the adoption or this document by the WG.
>
> Filip Skokan
>
> Odesl=C3=A1no z iPhonu
>
> 19. 7. 2018 v 19:43, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>:
>
> Hi all,
>
> This is the call for adoption of the 'JWT Response for OAuth Token
> Introspection' document following the presentation by Torsten at the
> Montreal IETF meeting where we didn't have a chance to do a call for
> adoption in the meeting itself.
>
> Here is presentation by Torsten:
> https://datatracker.ietf.org/meeting/102/materials/slides-
> 102-oauth-sessa-jwt-response-for-oauth-token-introspection-00
>
> Here is the document:
> https://tools.ietf.org/html/draft-lodderstedt-oauth-jwt-
> introspection-response-01
>
> Please let us know by August 2nd whether you accept / object to the
> adoption of this document as a starting point for work in the OAuth worki=
ng
> group.
>
> Regards,
> Hannes & Rifaat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


--=20
hans.zandbelt@zmartzone.eu
ZmartZone IAM - www.zmartzone.eu

--00000000000070b8d605718619a7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">+1<div><br></div><div>Hans.</div></div><div class=3D"gmail=
_extra"><br><div class=3D"gmail_quote">On Sat, Jul 21, 2018 at 7:12 PM, Fil=
ip Skokan <span dir=3D"ltr">&lt;<a href=3D"mailto:panva.ip@gmail.com" targe=
t=3D"_blank">panva.ip@gmail.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div dir=3D"auto">I support the adoption or this document by =
the WG.=C2=A0<div><br></div><div>Filip Skokan<br><br><div id=3D"m_-38993753=
4692326973AppleMailSignature">Odesl=C3=A1no z=C2=A0iPhonu</div><div><br>19.=
 7. 2018 v=C2=A019:43, Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf=
@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;:<br><br></div><=
div><div class=3D"h5"><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>=
Hi all,</div><div><br></div><div>This is the call for adoption of the &#39;=
JWT Response for OAuth Token Introspection&#39; document following the pres=
entation by Torsten at the Montreal IETF meeting where we didn&#39;t have a=
 chance to do a call for adoption in the meeting itself.</div><div><br></di=
v><div>Here is presentation by Torsten:</div><div><a href=3D"https://datatr=
acker.ietf.org/meeting/102/materials/slides-102-oauth-sessa-jwt-response-fo=
r-oauth-token-introspection-00" target=3D"_blank">https://datatracker.ietf.=
org/<wbr>meeting/102/materials/slides-<wbr>102-oauth-sessa-jwt-response-<wb=
r>for-oauth-token-introspection-<wbr>00</a></div><div><br></div><div>Here i=
s the document:</div><div><a href=3D"https://tools.ietf.org/html/draft-lodd=
erstedt-oauth-jwt-introspection-response-01" target=3D"_blank">https://tool=
s.ietf.org/html/<wbr>draft-lodderstedt-oauth-jwt-<wbr>introspection-respons=
e-01</a></div><div><br></div><div>Please let us know by August 2nd whether =
you accept / object to the adoption of this document as a starting point fo=
r work in the OAuth working group.</div><div><br></div><div>Regards,</div><=
div>Hannes &amp; Rifaat</div></div>
</div></blockquote></div></div><blockquote type=3D"cite"><div><span>_______=
_______________________<wbr>_________________</span><span class=3D""><br><s=
pan>OAuth mailing list</span><br><span><a href=3D"mailto:OAuth@ietf.org" ta=
rget=3D"_blank">OAuth@ietf.org</a></span><br><span><a href=3D"https://www.i=
etf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mail=
man/<wbr>listinfo/oauth</a></span><br></span></div></blockquote></div></div=
><br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div cla=
ss=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr">=
<div><div dir=3D"ltr"><div dir=3D"ltr"><div style=3D"font-size:small"><a hr=
ef=3D"mailto:hans.zandbelt@zmartzone.eu" target=3D"_blank">hans.zandbelt@zm=
artzone.eu</a></div><div style=3D"font-size:small">ZmartZone IAM - <a href=
=3D"http://www.zmartzone.eu" target=3D"_blank">www.zmartzone.eu</a><br></di=
v></div></div></div></div></div>
</div>

--00000000000070b8d605718619a7--


From nobody Sat Jul 21 12:03:47 2018
Return-Path: <panva.ip@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4900130934 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 12:03:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6L5HF5kh99L5 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 12:03:43 -0700 (PDT)
Received: from mail-oi0-x234.google.com (mail-oi0-x234.google.com [IPv6:2607:f8b0:4003:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE320130E0A for <oauth@ietf.org>; Sat, 21 Jul 2018 12:03:43 -0700 (PDT)
Received: by mail-oi0-x234.google.com with SMTP id i12-v6so26911411oik.2 for <oauth@ietf.org>; Sat, 21 Jul 2018 12:03:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=ae3x/48tqFUFQT+7zpCt4+A5Ce08BxE7DGvzOusX5a0=; b=Dbs1rXzXZsRhEFyj0qnenvEBVogrZmya9QjJPPBVmRPpyVQH+o2bTChTAy69J78F9N fwqtHhViGeqIU3wX5iSKKeoo2K/C3z4Vkd+bq/hLtETay2998bgWEcDYwR3eEgXZGESQ H1hHiGJPNsLVOB6Of0G+85fqqDp/rhIW47TgzwA6+bce+JGfvcm6F3RGunq1ueWcS6lL mahHlZIHWKDQRjE0MoEeY3txMPg2FiNDS80Pq1QhN5FRSbmn0LtZEJFWKfhV44ZHq/UM yBaC7/7OLHH8NamfrPwMQd47fiTz+X+pqXUKglavIgjO87YTSxcgxzRoaKnpJWxYyLjc eEQg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ae3x/48tqFUFQT+7zpCt4+A5Ce08BxE7DGvzOusX5a0=; b=O67PSBJd1+6WYgCzZG+B6JVUSpCyx5Mz81QuXS6ppaKWaf/k3Zc13qOj7J8kK+rZoN SL4quO/V09br5jT5HF1ehUeE77QhhFbct/3O6YHkG6/TZDrXiJArEQLesfNygnaXo835 rrOGCt3wiFXdOuYG0UkynuB0xlarWnmxIPg2MccMNeUj0N5ClNhfVJBsWFvznkW4Xzfx +uzsAANIkTeQVWto05z5AiVvHoZQ/WtnOIbZMXtlV/xFzHQ35TwuacZIsk7UeuwPpKaM o5uVyZ6R1DCvEkVgnIqhLPFDAUw+So5dR0xY+1Qk2mo5SckGDq3UpP3YOUAI1pkjLMbA eBHw==
X-Gm-Message-State: AOUpUlEs8a90fPHJD3GjgglBfgZiaWmkph0q1ZFr2E7w1NjbjKkrc5XZ 9F5Ks5PLIAzX9Qu+dm3D97EEU9GTJJqV628gc4FIkWc=
X-Google-Smtp-Source: AAOMgpc0mJfbRCuBUj8Guhox091fJ1+ik52j6mtuo5jo1Fm9pna6BAtX7OnYaWHenK4ymX2CMogqRuYyWWXChJwTma8=
X-Received: by 2002:aca:41d7:: with SMTP id o206-v6mr2708981oia.172.1532199822924;  Sat, 21 Jul 2018 12:03:42 -0700 (PDT)
MIME-Version: 1.0
From: Filip Skokan <panva.ip@gmail.com>
Date: Sat, 21 Jul 2018 21:03:31 +0200
Message-ID: <CALAqi_-=tXUo+=b+BXa06zQsd1Mp_wgiYtstUp8oT73KVhM0Gg@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="0000000000002ba20105718712e9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Ax9OacoQNCbLSq75RAEqh_E6FZ0>
Subject: [OAUTH-WG] regarding draft-ietf-oauth-jwsreq
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 19:03:46 -0000

--0000000000002ba20105718712e9
Content-Type: text/plain; charset="UTF-8"

Hello,

about the mentioned content-types in the current draft *jwsreq-16*

in *section-10.4.1* - says to

check the content type of the response is "application/jose"


I believe this should be application/jwt instead

in *section-10.4.2* - says to

check the content type of the response is "application/json"


I believe this should be application/jwt too

Both to be in line with the example of fetch response from *section-5.2.3 *

Best,
*Filip Skokan*

--0000000000002ba20105718712e9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hello,</div><div><br></div><div>about the mentioned c=
ontent-types in the current draft <b>jwsreq-16</b></div><div><br></div><div=
>in=C2=A0<i>section-10.4.1</i> - says to</div><div><br></div><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid=
 rgb(204,204,204);padding-left:1ex">check the content type of the response =
is &quot;application/jose&quot;</blockquote><div><br></div><div>I believe t=
his should be <font face=3D"monospace, monospace">application/jwt</font> in=
stead</div><div><br></div><div>in <i>section-10.4.2</i> - says to</div><div=
><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.=
8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">check the cont=
ent type of the response is &quot;application/json&quot;</blockquote><div><=
br></div><div>I believe this should be <font face=3D"monospace, monospace">=
application/jwt</font> too</div><div><br></div><div>Both to be in line with=
 the example of fetch response from=C2=A0<i>section-5.2.3=C2=A0</i></div><b=
r clear=3D"all"><div><div dir=3D"ltr" class=3D"gmail_signature">Best,<br><b=
>Filip Skokan</b></div></div></div>

--0000000000002ba20105718712e9--


From nobody Sat Jul 21 14:24:59 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A367F130E15 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:24:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MH8YEMcB6JzK for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:24:55 -0700 (PDT)
Received: from mail-io0-x234.google.com (mail-io0-x234.google.com [IPv6:2607:f8b0:4001:c06::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D4A112426A for <oauth@ietf.org>; Sat, 21 Jul 2018 14:24:55 -0700 (PDT)
Received: by mail-io0-x234.google.com with SMTP id q19-v6so12637212ioh.11 for <oauth@ietf.org>; Sat, 21 Jul 2018 14:24:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=odyMfe9Ms0p/+qPwKSIooKbwI6/BWJG2tcm+zn7IujM=; b=KH1H6STg4bUSrThAhrb3OfP19uIEPFjFLBE+uWAelQEMkARkLAQVsF/zTE4OXoZ6Kj olwMQg6lW6/f2fEHc5Cf1UaqEzmfX7aLHf10tuLtxu/CcaVce3jYXKswLIueo9Aob1VP LRXdcxHdZ/bUDWbZPfWnxvI3zqedlZRnsecOUnkO1ynwR/tZVnMkB4AU0BxRB7SehPTE 9YExxLBCVNSqKI3kItQ7zxk/SOzlJLKHcuAnUZMixBIt9wjiKfS2Z53Dz1uyJVcTuIIZ 5o3qTU7i6OLzglIdjhWiAfSEDktTmaO4f2Wz8IB1Rm3fqbmJiwpEABh8GMqRNYzRUTeT joqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=odyMfe9Ms0p/+qPwKSIooKbwI6/BWJG2tcm+zn7IujM=; b=QJ2AwOiVx/U9cHSdibiezpwq0v3e2VJSnoISe7PC1y/dPUHXZVleznvrygAqfoDTGp gXoVJBn2WBUMQTbh9wU1okWda4PzuNxzEohwPDXhKZ94HKRVNc4x9paEzx6syFmIHk6q wXmKL/WxPOLSqOpEF9CtKQ3Bt+tKpbLsFHHXYxPodugw8MPLy1OAWOUBD5KJBewfhjcm e3GLMcG/GN8/PFtuHl5M6PtYnj0KH2mFsfxULSMWIYJv93e3wA5wWgWv1dvsK5PSU0dX MWSvpzjWyhzurzSVKgLjk+EoirLVe1b7Q6Wu7bZopKrFkCPGLFPW4Mm89D6gZ8kbYmhC qmdw==
X-Gm-Message-State: AOUpUlHl2pl3LYb1dHK2ba0p/+J1hqXvBzgCfg0WbPJJ/VsvWl6LPi5J lsHvwCTuEzgvRdTBynxkMRt1t2zdDedzv6Ip4MOrSZA0zeM=
X-Google-Smtp-Source: AAOMgpe83SuyfrwQSwmlo52xXb7tQF6MgTADRqrPTLoBxEw4SbIXOcBd7VPPc+zqMZ2NBstFmr9ujLxDi3oKQKMeHb8=
X-Received: by 2002:a6b:2353:: with SMTP id j80-v6mr5166726ioj.99.1532208294583;  Sat, 21 Jul 2018 14:24:54 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 21 Jul 2018 17:25:30 -0400
Message-ID: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001ee2210571890b04"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/RZGN1LW8y4uSDsl2sI1VytGIqms>
Subject: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 21:24:58 -0000

--0000000000001ee2210571890b04
Content-Type: text/plain; charset="UTF-8"

All,

The following is the shepherd write-up for the draft-ietf-oauth-mtls-10
document:
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/

Please, take a look and let us know if you have any comments.

Regards,
 Rifaat & Hannes

--0000000000001ee2210571890b04
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">All,<div><br></div><div>The following is the shepherd writ=
e-up for the=C2=A0draft-ietf-oauth-mtls-10 document:</div><div><a href=3D"h=
ttps://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/">htt=
ps://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/</a><br=
></div><div><br></div><div>Please, take a look and let us know if you have =
any comments.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat &amp=
; Hannes</div></div>

--0000000000001ee2210571890b04--


From nobody Sat Jul 21 14:38:12 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7543C12426A for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:38:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a2MhmTctA7oS for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:38:06 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.18.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2105B130E3D for <oauth@ietf.org>; Sat, 21 Jul 2018 14:38:06 -0700 (PDT)
Received: from [80.187.108.110] (helo=[10.16.27.54]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fgzZi-0001ec-Ux; Sat, 21 Jul 2018 23:38:03 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-5E5D217B-66C0-4A61-BEFF-0D731C23014C; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>
Date: Sat, 21 Jul 2018 23:38:01 +0200
Cc: oauth <oauth@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <570E9B49-9A42-453F-8401-125F5986B8DE@lodderstedt.net>
References: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/h_91Seuxkm3oEmwvxcueZLJM_BM>
Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 21:38:11 -0000

--Apple-Mail-5E5D217B-66C0-4A61-BEFF-0D731C23014C
Content-Type: multipart/alternative;
	boundary=Apple-Mail-B7D01C8D-B34C-4A8B-81A4-9448C06FFDAA
Content-Transfer-Encoding: 7bit


--Apple-Mail-B7D01C8D-B34C-4A8B-81A4-9448C06FFDAA
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Rifaat,

Berlin Group=E2=80=98s Nextgen PSD2 Spec (https://docs.wixstatic.com/ugd/c29=
14b_5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS.

kind regards,
Torsten.

> Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>:=

>=20
> All,
>=20
> The following is the shepherd write-up for the drafts-ietf-oauth-mtls-10 d=
ocument:
> https://datahttps://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepher=
dwriteup/tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
>=20
> Please, take a look and let us know if you have any comments.
>=20
> Regards,
>  Rifaat & Hannes
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-B7D01C8D-B34C-4A8B-81A4-9448C06FFDAA
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div><span></span></div><div><div></div><di=
v>Hi Rifaat,</div><div><br></div><div>Berlin Group=E2=80=98s Nextgen PSD2 Sp=
ec (<a href=3D"https://docs.wixstatic.com/ugd/c2914b_5351b289bf844c6881e46ee=
3561d95bb.pdf">https://docs.wixstatic.com/ugd/c2914b_5351b289bf844c6881e46ee=
3561d95bb.pdf</a>) also refers to mTLS.</div><div><br></div><div>kind regard=
s,</div><div>Torsten.</div><div><br>Am 21.07.2018 um 23:25 schrieb Rifaat Sh=
ekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com">rifaat.ietf@gmail.com=
</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">All,<=
div><br></div><div>The following is the shepherd write-up for the&nbsp;draft=
s-ietf-oauth-mtls-10 document:</div><div><a href=3D"https://datatracker.ietf=
.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/">https://data</a><a href=3D"=
https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/">htt=
ps://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/</a><a h=
ref=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteu=
p/">tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/</a></div></d=
iv></div></blockquote><blockquote type=3D"cite"><div><div dir=3D"ltr"><div><=
br></div><div>Please, take a look and let us know if you have any comments.<=
/div><div><br></div><div>Regards,</div><div>&nbsp;Rifaat &amp; Hannes</div><=
/div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></div></body></html>=

--Apple-Mail-B7D01C8D-B34C-4A8B-81A4-9448C06FFDAA--

--Apple-Mail-5E5D217B-66C0-4A61-BEFF-0D731C23014C
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-5E5D217B-66C0-4A61-BEFF-0D731C23014C--


From nobody Sat Jul 21 14:58:35 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70DCD130E15 for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:58:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 671OxksuFKhW for <oauth@ietfa.amsl.com>; Sat, 21 Jul 2018 14:58:29 -0700 (PDT)
Received: from mail-io0-x22d.google.com (mail-io0-x22d.google.com [IPv6:2607:f8b0:4001:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A2FF130DE7 for <oauth@ietf.org>; Sat, 21 Jul 2018 14:58:29 -0700 (PDT)
Received: by mail-io0-x22d.google.com with SMTP id l7-v6so12666779ioj.1 for <oauth@ietf.org>; Sat, 21 Jul 2018 14:58:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=A4vjVoTHvAqVjDYSrkXt9npPJR5HZ9MJ+oE+hRB0q8I=; b=lvBU2EvHPjPB9lnmk/jbDl49Y7T2NHWlQpkpIFDbj793LMCIdTjvCWpyXkZa8n/La9 J5lZvDt/k9BKtCpRAuq/q4L11AdiVDcjtdvbpVRmy99b+vNpj+1RECtYzQn9PD6xgg4J QjqnyzCCPowN0WC5XMWmN1nga4L2pNXAU6FD9RgRfYahwGt8uI5TBpSfbIWp++gDKPpy 8s/gEKWM17a8HtddQX4OGYtE97LtT4aDRehLO4VnqxATGShuq2CI0qkozRF2PmpoBCz/ GeEVvfNQOSS4HED7mVe55NNHAhMTHJCFcyqcHtNXzzBaOAwqS2EbqI66Y2GJ1u1+zx14 lNaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=A4vjVoTHvAqVjDYSrkXt9npPJR5HZ9MJ+oE+hRB0q8I=; b=tyD/LBr6SiXb11p1Yx92ULBseqOxn7O51F1FaqseXzCursBrxN8TDJgRSRXQ3uZ+OM 850wStX9RIh626AmVM9LPs1083fztlsg+ahqQomutC42uQBVO7nK+rlwplDWe/S58K6F 0KMWewMvlOrOXeyXtIaUNsKy4aeepQ9JM7IlIkv9eoJEY6AixzwEMpbGVuTpjlA05sWu oX47VdKKIybUYIWL9Qft/2qWipHaSzpDatoZ8F5jfj7sGYz7LBzX1UMrnwR1kzLoj5ug bw6mk/jc0aYzuPeiZqIgHzE2rKI0/7c5NtggkjKlsrMXfjK2P8KhkJL5kBwIRKYU8i1a eOjQ==
X-Gm-Message-State: AOUpUlE1xSetCqTIGD0KhMF/ZNRwvPNlSNsi3tlATgO+xdGnp9urm/rk PGDodV0KKRA604JfsD5sBioGzaUK5ywLE4lzDPYOkQGh
X-Google-Smtp-Source: AAOMgpeACMteXfIwP09CD13lnm0gT86qW8G/vZV1+IiYi1uYVt4AYHIh5GsoKPYiVFkMEUr3Yx29q0ilwzmNG8xWpGI=
X-Received: by 2002:a6b:2353:: with SMTP id j80-v6mr5208932ioj.99.1532210308905;  Sat, 21 Jul 2018 14:58:28 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a4f:8402:0:0:0:0:0 with HTTP; Sat, 21 Jul 2018 14:58:28 -0700 (PDT)
In-Reply-To: <570E9B49-9A42-453F-8401-125F5986B8DE@lodderstedt.net>
References: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com> <570E9B49-9A42-453F-8401-125F5986B8DE@lodderstedt.net>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 21 Jul 2018 17:58:28 -0400
Message-ID: <CAGL6epKpiQxtANnymsVwnWbTz7Uz79NQMsRE7fp9vK00fGJ-PA@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002efde10571898336"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/oc-sqV_rQZ8lM03Holn4I69lU_8>
Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Jul 2018 21:58:33 -0000

--0000000000002efde10571898336
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks Torsten!


On Saturday, July 21, 2018, Torsten Lodderstedt <torsten@lodderstedt.net>
wrote:

> Hi Rifaat,
>
> Berlin Group=E2=80=98s Nextgen PSD2 Spec (https://docs.wixstatic.com/ugd/=
c2914b_
> 5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS.
>
> kind regards,
> Torsten.
>
> Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>=
:
>
> All,
>
> The following is the shepherd write-up for the drafts-ietf-oauth-mtls-10
> document:
> https://data
> <https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/>
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
> tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
> <https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/>
>
>
> Please, take a look and let us know if you have any comments.
>
> Regards,
>  Rifaat & Hannes
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--0000000000002efde10571898336
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks Torsten!<div><br><br>On Saturday, July 21, 2018, Torsten Lodderstedt=
 &lt;<a href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a>=
&gt; wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><div><span>=
</span></div><div><div></div><div>Hi Rifaat,</div><div><br></div><div>Berli=
n Group=E2=80=98s Nextgen PSD2 Spec (<a href=3D"https://docs.wixstatic.com/=
ugd/c2914b_5351b289bf844c6881e46ee3561d95bb.pdf" target=3D"_blank">https://=
docs.wixstatic.com/<wbr>ugd/c2914b_<wbr>5351b289bf844c6881e46ee3561d95<wbr>=
bb.pdf</a>) also refers to mTLS.</div><div><br></div><div>kind regards,</di=
v><div>Torsten.</div><div><br>Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Y=
usef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.=
ietf@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div di=
r=3D"ltr">All,<div><br></div><div>The following is the shepherd write-up fo=
r the=C2=A0drafts-ietf-oauth-mtls-10 document:</div><div><a href=3D"https:/=
/datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/" target=3D=
"_blank">https://data</a><a href=3D"https://datatracker.ietf.org/doc/draft-=
ietf-oauth-mtls/shepherdwriteup/" target=3D"_blank">https://<wbr>datatracke=
r.ietf.org/doc/<wbr>draft-ietf-oauth-mtls/<wbr>shepherdwriteup/</a><a href=
=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/=
" target=3D"_blank">tracker.ietf.<wbr>org/doc/draft-ietf-oauth-mtls/<wbr>sh=
epherdwriteup/</a></div></div></div></blockquote><blockquote type=3D"cite">=
<div><div dir=3D"ltr"><div><br></div><div>Please, take a look and let us kn=
ow if you have any comments.</div><div><br></div><div>Regards,</div><div>=
=C2=A0Rifaat &amp; Hannes</div></div>
</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
___________<wbr>_________________</span><br><span>OAuth mailing list</span>=
<br><span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.or=
g</a></span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a></=
span><br></div></blockquote></div></div></blockquote></div>

--0000000000002efde10571898336--


From nobody Sun Jul 22 07:54:19 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCD27130E42 for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 07:54:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Aw12cBSjMZlM for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 07:54:15 -0700 (PDT)
Received: from mail-it0-x231.google.com (mail-it0-x231.google.com [IPv6:2607:f8b0:4001:c0b::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F7BA129C6B for <oauth@ietf.org>; Sun, 22 Jul 2018 07:54:15 -0700 (PDT)
Received: by mail-it0-x231.google.com with SMTP id p17-v6so20384828itc.2 for <oauth@ietf.org>; Sun, 22 Jul 2018 07:54:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=C3NBUpbPJhLEMK1IyUUrk9jpf8nj9o8d39IGKdaoc5Y=; b=QZlAoyoK97CpGky71BYDaHMZLq87PtdWPXA/88lT2kK5QxyEH+e9SPg+JCyY8HMHDo kbp8NUKChqQE5zELKk2x7O78bHNw8bb3m/jI38Qc0yh5qAxluArPj3b3mQknL5Y32dV0 sHui5pKW6CflIcCEBYH5UrHKNcYkK1Y3Z7LpM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=C3NBUpbPJhLEMK1IyUUrk9jpf8nj9o8d39IGKdaoc5Y=; b=kODKQdgjnDXnn2qlRHoRLqRw0kky10FgfsNsj9JxBpP0ixn+rYeNMVpXZImB/L4K62 LgLKRadlkaSD4pII/R08wwXAVxWkLsHZGe6i+mG2p4bIFgaXmsmy5P+Ntmrwpq5osClg m7XYZ/k7x9rI80k7d/n4ZAioPh7ofQ6ubYF6MBjlBgr2JDWfCF1dO5ZC6RZ0vtQSQYS+ Hc7YpibMVCvD1+0KM/i+GVCMIw7I9XsLBT1Wa5JO33niala8IabYs3S8eUfoJi4a1BDj 2+n+r2TamoMv+8KrIbMKJ3zoOWY6Tb3UWqRJsWJA9bE9icyRZtoZGyadMqzA7D509nKd EODg==
X-Gm-Message-State: AOUpUlGQkEpI6ezVmrb5K+wz4bVN6UhVg8o5CR6M1f1B3CUBcVhfQe++ Z3Fdw38A8TO+rwERcxVzm8RUQF586SYw9CrXHLfnl5ZGJZgBq3yMhtC2IkP0qQKPc8M1GLMH6e2 EurO9PLxf5+LNOQ==
X-Google-Smtp-Source: AAOMgpfcMVI7rqR7MOfB9JuiFrvfZXeZENcDnF8uL5cEPKbJ3A25qSFLuXCFPjUOYkKbpbmCEZ4ACvSWxEQPA/EgZi0=
X-Received: by 2002:a24:19d5:: with SMTP id b204-v6mr7458330itb.25.1532271254698;  Sun, 22 Jul 2018 07:54:14 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Sun, 22 Jul 2018 07:53:44 -0700 (PDT)
In-Reply-To: <CALAqi_-=tXUo+=b+BXa06zQsd1Mp_wgiYtstUp8oT73KVhM0Gg@mail.gmail.com>
References: <CALAqi_-=tXUo+=b+BXa06zQsd1Mp_wgiYtstUp8oT73KVhM0Gg@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Sun, 22 Jul 2018 08:53:44 -0600
Message-ID: <CA+k3eCSLD4ago_UbXDN=EEOuJP6vEpsEZpF+E0O8d59aLvO5LQ@mail.gmail.com>
To: Filip Skokan <panva.ip@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d6198b057197b3cb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/GMiYH0lAchrmrTy7fVIDBJGEV8E>
Subject: Re: [OAUTH-WG] regarding draft-ietf-oauth-jwsreq
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 14:54:18 -0000

--000000000000d6198b057197b3cb
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I believe Filip is correct on these.

On Sat, Jul 21, 2018 at 1:03 PM, Filip Skokan <panva.ip@gmail.com> wrote:

> Hello,
>
> about the mentioned content-types in the current draft *jwsreq-16*
>
> in *section-10.4.1* - says to
>
> check the content type of the response is "application/jose"
>
>
> I believe this should be application/jwt instead
>
> in *section-10.4.2* - says to
>
> check the content type of the response is "application/json"
>
>
> I believe this should be application/jwt too
>
> Both to be in line with the example of fetch response from
> *section-5.2.3 *
>
> Best,
> *Filip Skokan*
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000d6198b057197b3cb
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I believe Filip is correct on these.<br></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sat, Jul 21, 2018 at 1:0=
3 PM, Filip Skokan <span dir=3D"ltr">&lt;<a href=3D"mailto:panva.ip@gmail.c=
om" target=3D"_blank">panva.ip@gmail.com</a>&gt;</span> wrote:<br><blockquo=
te class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc so=
lid;padding-left:1ex"><div dir=3D"ltr"><div>Hello,</div><div><br></div><div=
>about the mentioned content-types in the current draft <b>jwsreq-16</b></d=
iv><div><br></div><div>in=C2=A0<i>section-10.4.1</i> - says to</div><div><b=
r></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex=
;border-left:1px solid rgb(204,204,204);padding-left:1ex">check the content=
 type of the response is &quot;application/jose&quot;</blockquote><div><br>=
</div><div>I believe this should be <font face=3D"monospace, monospace">app=
lication/jwt</font> instead</div><div><br></div><div>in <i>section-10.4.2</=
i> - says to</div><div><br></div><blockquote class=3D"gmail_quote" style=3D=
"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
ft:1ex">check the content type of the response is &quot;application/json&qu=
ot;</blockquote><div><br></div><div>I believe this should be <font face=3D"=
monospace, monospace">application/jwt</font> too</div><div><br></div><div>B=
oth to be in line with the example of fetch response from=C2=A0<i>section-5=
.2.3=C2=A0</i></div><br clear=3D"all"><div><div dir=3D"ltr" class=3D"m_3807=
472063090994901gmail_signature">Best,<br><b>Filip Skokan</b></div></div></d=
iv>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000d6198b057197b3cb--


From nobody Sun Jul 22 13:23:20 2018
Return-Path: <farezeysz@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF8E2130FFE for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 13:23:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jKXwei7lVREj for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 13:23:15 -0700 (PDT)
Received: from mail-pl0-x235.google.com (mail-pl0-x235.google.com [IPv6:2607:f8b0:400e:c01::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11E77124C04 for <oauth@ietf.org>; Sun, 22 Jul 2018 13:23:15 -0700 (PDT)
Received: by mail-pl0-x235.google.com with SMTP id w8-v6so7317845ply.8 for <oauth@ietf.org>; Sun, 22 Jul 2018 13:23:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=date:from:to:message-id:in-reply-to:subject:mime-version; bh=MklGcyT6VtJu69enHgD2wSIu/5YzlgkPB3SCowqEPag=; b=YZ9awOzLvIPY0ricXJsD+OA5uNyN+9yJr86HTrYExL8YWTZ2jSIDM5V/HsY0OYbH/J orBOtP0u/iUBQqd4AdhsAjs9MLUeV+l5pYJ2Zj5of6DycQYyd3fxR6pjQjU0HiRkEFvU s6CAJZMfr8N+VAmsLYqRKdFhSP7T//9FQL6/H4aoJdF8TIRx0Kz7w23Zav3/4yVn3fDT keDPpoFnRxndiElXtIij/41oFJxjlzn+QXyTX1StfLiYyPMBdX2yqZh/c92+qKiyMmVj t2leWYc/UbRrPcGcMM1vOuEkbS8c3hg3V0MXn5LZB1cQMR3cX2DKlUn1hLT7mPHkbQpd /3hQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:message-id:in-reply-to:subject :mime-version; bh=MklGcyT6VtJu69enHgD2wSIu/5YzlgkPB3SCowqEPag=; b=YEyLEFPdBK9EQ7I4ndGX+o4dc/g/Vdt27E5EWtjms6kGEg5K2fCe+shyqpMKpo51qT QFSs4fSvOYD4l7wkYpLyu2y4kQKr/mYIzIF1rLq32aqCLh9RRkrm2LzLu6noPjQQ9pUv a2sT5V9dSGQaRn8KOiWkw9hD+rHHJXqtiaW/CeclYvLy+BWjN8zSF50o8m90ehAVNM1n d4b4q+puod44V3BzP4BBdFJAAgFXsFo0KAI5mA1uc7X1CGPP55nNhSbAuqakRIOj/4jC LgOgdFjk8QA9coP9Qn1d6OPtztgKd+JBNOZPQvQJGZ19MAqFmhHkUCEb0QxE5ekkpSwF NPxg==
X-Gm-Message-State: AOUpUlFcByEC6vzz8v3ZW/tqspkBFTZPo4c9Qki/eFWb9RK+jVnVczqh MbGg96pBUXR16Hr22fiGYx1UC5/fh90=
X-Google-Smtp-Source: AAOMgpdCZl9oo0f7QnsIJPxxbIxwlf3F5PCbqkHOedT3EAmcAlHa837a5EGbpv1a4RXKVuqUU8gY7w==
X-Received: by 2002:a17:902:708b:: with SMTP id z11-v6mr10034476plk.262.1532290994010;  Sun, 22 Jul 2018 13:23:14 -0700 (PDT)
Received: from [2404:160:8113:c643:80eb:e413:100::] ([2404:160:8113:c643:b9d1:ad04:4aa7:3c3a]) by smtp.gmail.com with ESMTPSA id r87-v6sm12292437pfb.1.2018.07.22.13.23.11 for <oauth@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 22 Jul 2018 13:23:12 -0700 (PDT)
Date: Mon, 23 Jul 2018 04:23:09 +0800
From: Eysz 7Words <farezeysz@gmail.com>
To: Oauth <oauth@ietf.org>
Message-ID: <e2a7a535-d8a3-4125-b754-5d850a3acdd3@eysz7xusersnoreplygithubcom>
In-Reply-To: <mailman.3687.1532271258.5771.oauth@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5b54e7ad_6b8b4567_19c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/bM1-0LpzBfR5GSum4VvDPhr6IvE>
Subject: Re: [OAUTH-WG] Content of OAuth Digest, Vol 117, Issue 43
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 20:23:19 -0000

--5b54e7ad_6b8b4567_19c
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

     
 

  Re: Contents of OAuth digest
 

 
 

 
 
>  
> On Jul 22, 2018 at 10:54 PTG,  <Oauth-Request (mailto:oauth-request@ietf.org)>  wrote:
>  
>  
>  
>  Send OAuth mailing list submissions to 
>  oauth@ietf.org 
>
> To subscribe or unsubscribe via the World Wide Web, visit 
>  https://www.ietf.org/mailman/listinfo/oauth 
> or, via email, send a message with subject or body 'help' to 
>  oauth-request@ietf.org 
>
> You can reach the person managing the list at 
>  oauth-owner@ietf.org 
>
> When replying, please edit your Subject line so it is more specific 
> than "Re: Contents of OAuth digest..." 
>
>
> Today's Topics: 
>
>  1. regarding draft-ietf-oauth-jwsreq (Filip Skokan) 
>  2. Shepherd write-up for draft-ietf-oauth-mtls-10 
>  (Rifaat Shekh-Yusef) 
>  3. Re: Shepherd write-up for draft-ietf-oauth-mtls-10 
>  (Torsten Lodderstedt) 
>  4. Re: Shepherd write-up for draft-ietf-oauth-mtls-10 
>  (Rifaat Shekh-Yusef) 
>  5. Re: regarding draft-ietf-oauth-jwsreq (Brian Campbell) 
>
>
> ---------------------------------------------------------------------- 
>
> Message: 1 
> Date: Sat, 21 Jul 2018 21:03:31 +0200 
> From: Filip Skokan  <panva.ip@gmail.com>  
> To: oauth@ietf.org 
> Subject: [OAUTH-WG] regarding draft-ietf-oauth-jwsreq 
> Message-ID: 
>   <CALAqi_-=tXUo+=b+BXa06zQsd1Mp_wgiYtstUp8oT73KVhM0Gg@mail.gmail.com>  
> Content-Type: text/plain; charset="utf-8" 
>
> Hello, 
>
> about the mentioned content-types in the current draft *jwsreq-16* 
>
> in *section-10.4.1* - says to 
>
> check the content type of the response is "application/jose" 
>
>
> I believe this should be application/jwt instead 
>
> in *section-10.4.2* - says to 
>
> check the content type of the response is "application/json" 
>
>
> I believe this should be application/jwt too 
>
> Both to be in line with the example of fetch response from *section-5.2.3 * 
>
> Best, 
> *Filip Skokan* 
> -------------- next part -------------- 
> An HTML attachment was scrubbed... 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180721/24905181/attachment.html>  
>
> ------------------------------ 
>
> Message: 2 
> Date: Sat, 21 Jul 2018 17:25:30 -0400 
> From: Rifaat Shekh-Yusef  <rifaat.ietf@gmail.com>  
> To: oauth  <oauth@ietf.org>  
> Subject: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10 
> Message-ID: 
>   <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>  
> Content-Type: text/plain; charset="utf-8" 
>
> All, 
>
> The following is the shepherd write-up for the draft-ietf-oauth-mtls-10 
> document: 
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/ 
>
> Please, take a look and let us know if you have any comments. 
>
> Regards, 
>  Rifaat  &  Hannes 
> -------------- next part -------------- 
> An HTML attachment was scrubbed... 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180721/08f5fd81/attachment.html>  
>
> ------------------------------ 
>
> Message: 3 
> Date: Sat, 21 Jul 2018 23:38:01 +0200 
> From: Torsten Lodderstedt  <torsten@lodderstedt.net>  
> To: Rifaat Shekh-Yusef  <rifaat.ietf@gmail.com>  
> Cc: oauth  <oauth@ietf.org>  
> Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10 
> Message-ID:  <570E9B49-9A42-453F-8401-125F5986B8DE@lodderstedt.net>  
> Content-Type: text/plain; charset="utf-8" 
>
> Hi Rifaat, 
>
> Berlin Group?s Nextgen PSD2 Spec (https://docs.wixstatic.com/ugd/c2914b_5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS. 
>
> kind regards, 
> Torsten. 
>
> >  Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef  <rifaat.ietf@gmail.com>: 
> >  
> >  All, 
> >  
> >  The following is the shepherd write-up for the drafts-ietf-oauth-mtls-10 document: 
> >  https://datahttps://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/ 
> >  
> >  Please, take a look and let us know if you have any comments. 
> >  
> >  Regards, 
> >  Rifaat  &  Hannes 
> >  _______________________________________________ 
> >  OAuth mailing list 
> >  OAuth@ietf.org 
> >  https://www.ietf.org/mailman/listinfo/oauth 
> -------------- next part -------------- 
> An HTML attachment was scrubbed... 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180721/a2574dc4/attachment.html>  
> -------------- next part -------------- 
> A non-text attachment was scrubbed... 
> Name: smime.p7s 
> Type: application/pkcs7-signature 
> Size: 3717 bytes 
> Desc: not available 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180721/a2574dc4/attachment.p7s>  
>
> ------------------------------ 
>
> Message: 4 
> Date: Sat, 21 Jul 2018 17:58:28 -0400 
> From: Rifaat Shekh-Yusef  <rifaat.ietf@gmail.com>  
> To: Torsten Lodderstedt  <torsten@lodderstedt.net>  
> Cc: oauth  <oauth@ietf.org>  
> Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10 
> Message-ID: 
>   <CAGL6epKpiQxtANnymsVwnWbTz7Uz79NQMsRE7fp9vK00fGJ-PA@mail.gmail.com>  
> Content-Type: text/plain; charset="utf-8" 
>
> Thanks Torsten! 
>
>
> On Saturday, July 21, 2018, Torsten Lodderstedt  <torsten@lodderstedt.net>  
> wrote: 
>
> >  Hi Rifaat, 
> >  
> >  Berlin Group?s Nextgen PSD2 Spec (https://docs.wixstatic.com/ugd/c2914b_ 
> >  5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS. 
> >  
> >  kind regards, 
> >  Torsten. 
> >  
> >  Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef  <rifaat.ietf@gmail.com>: 
> >  
> >  All, 
> >  
> >  The following is the shepherd write-up for the drafts-ietf-oauth-mtls-10 
> >  document: 
> >  https://data 
> >   <https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/>  
> >  https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/ 
> >  tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/ 
> >   <https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/>  
> >  
> >  
> >  Please, take a look and let us know if you have any comments. 
> >  
> >  Regards, 
> >  Rifaat  &  Hannes 
> >  
> >  _______________________________________________ 
> >  OAuth mailing list 
> >  OAuth@ietf.org 
> >  https://www.ietf.org/mailman/listinfo/oauth 
> >  
> >  
> -------------- next part -------------- 
> An HTML attachment was scrubbed... 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180721/5fe9b9c5/attachment.html>  
>
> ------------------------------ 
>
> Message: 5 
> Date: Sun, 22 Jul 2018 08:53:44 -0600 
> From: Brian Campbell  <bcampbell@pingidentity.com>  
> To: Filip Skokan  <panva.ip@gmail.com>  
> Cc: oauth  <oauth@ietf.org>  
> Subject: Re: [OAUTH-WG] regarding draft-ietf-oauth-jwsreq 
> Message-ID: 
>   <CA+k3eCSLD4ago_UbXDN=EEOuJP6vEpsEZpF+E0O8d59aLvO5LQ@mail.gmail.com>  
> Content-Type: text/plain; charset="utf-8" 
>
> I believe Filip is correct on these. 
>
> On Sat, Jul 21, 2018 at 1:03 PM, Filip Skokan  <panva.ip@gmail.com>  wrote: 
>
> >  Hello, 
> >  
> >  about the mentioned content-types in the current draft *jwsreq-16* 
> >  
> >  in *section-10.4.1* - says to 
> >  
> >  check the content type of the response is "application/jose" 
> >  
> >  
> >  I believe this should be application/jwt instead 
> >  
> >  in *section-10.4.2* - says to 
> >  
> >  check the content type of the response is "application/json" 
> >  
> >  
> >  I believe this should be application/jwt too 
> >  
> >  Both to be in line with the example of fetch response from 
> >  *section-5.2.3 * 
> >  
> >  Best, 
> >  *Filip Skokan* 
> >  
> >  _______________________________________________ 
> >  OAuth mailing list 
> >  OAuth@ietf.org 
> >  https://www.ietf.org/mailman/listinfo/oauth 
> >  
> >  
>
> -- 
> _CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
> material for the sole use of the intended recipient(s). Any review, use, 
> distribution or disclosure by others is strictly prohibited.? If you have 
> received this communication in error, please notify the sender immediately 
> by e-mail and delete the message and any file attachments from your 
> computer. Thank you._ 
> -------------- next part -------------- 
> An HTML attachment was scrubbed... 
> URL:  <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20180722/332f031f/attachment.html>  
>
> ------------------------------ 
>
> Subject: Digest Footer 
>
> _______________________________________________ 
> OAuth mailing list 
> OAuth@ietf.org 
> https://www.ietf.org/mailman/listinfo/oauth 
>
>
> ------------------------------ 
>
> End of OAuth Digest, Vol 117, Issue 43 
> ************************************** 
>              
--5b54e7ad_6b8b4567_19c
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<html><body><div id=3D=22edo-message=22><div></div><span style=3D=22-webk=
it-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);=22><=
b><i>Re: Contents of OAuth digest</i></b></span></div><div id=3D=22edo-me=
ta=22></div><div id=3D=22edo-original=22><div><br><br><blockquote type=3D=
=22cite=22 style=3D=22margin:1ex 0 0 0;border-left:1px =23ccc solid;paddi=
ng-left:0.5ex;=22><div>On Jul 22, 2018 at 10:54 PTG, &lt;<a href=3D=22mai=
lto:oauth-request=40ietf.org=22>Oauth-Request</a>&gt; wrote:<br><br></div=
><div><pre>Send OAuth mailing list submissions to
<br>	oauth=40ietf.org
<br>
<br>To subscribe or unsubscribe via the World Wide Web, visit
<br>	https://www.ietf.org/mailman/listinfo/oauth
<br>or, via email, send a message with subject or body 'help' to
<br>	oauth-request=40ietf.org
<br>
<br>You can reach the person managing the list at
<br>	oauth-owner=40ietf.org
<br>
<br>When replying, please edit your Subject line so it is more specific
<br>than =22Re: Contents of OAuth digest...=22
<br>
<br>
<br>Today's Topics:
<br>
<br>   1. regarding draft-ietf-oauth-jwsreq (=46ilip Skokan)
<br>   2. Shepherd write-up for draft-ietf-oauth-mtls-10
<br>      (Rifaat Shekh-Yusef)
<br>   3. Re: Shepherd write-up for draft-ietf-oauth-mtls-10
<br>      (Torsten Lodderstedt)
<br>   4. Re: Shepherd write-up for draft-ietf-oauth-mtls-10
<br>      (Rifaat Shekh-Yusef)
<br>   5. Re: regarding draft-ietf-oauth-jwsreq (Brian Campbell)
<br>
<br>
<br>---------------------------------------------------------------------=
-
<br>
<br>Message: 1
<br>Date: Sat, 21 Jul 2018 21:03:31 +0200
<br>=46rom: =46ilip Skokan &lt;panva.ip=40gmail.com&gt;
<br>To: oauth=40ietf.org
<br>Subject: =5BOAUTH-WG=5D regarding draft-ietf-oauth-jwsreq
<br>Message-ID:
<br>	&lt;CALAqi=5F-=3DtXUo+=3Db+BXa06zQsd1Mp=5FwgiYtstUp8oT73KVhM0Gg=40ma=
il.gmail.com&gt;
<br>Content-Type: text/plain; charset=3D=22utf-8=22
<br>
<br>Hello,
<br>
<br>about the mentioned content-types in the current draft *jwsreq-16*
<br>
<br>in *section-10.4.1* - says to
<br>
<br>check the content type of the response is =22application/jose=22
<br>
<br>
<br>I believe this should be application/jwt instead
<br>
<br>in *section-10.4.2* - says to
<br>
<br>check the content type of the response is =22application/json=22
<br>
<br>
<br>I believe this should be application/jwt too
<br>
<br>Both to be in line with the example of fetch response from *section-5=
.2.3 *
<br>
<br>Best,
<br>*=46ilip Skokan*
<br>-------------- next part --------------
<br>An HTML attachment was scrubbed...
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180721/24905181/attachment.html&gt;
<br>
<br>------------------------------
<br>
<br>Message: 2
<br>Date: Sat, 21 Jul 2018 17:25:30 -0400
<br>=46rom: Rifaat Shekh-Yusef &lt;rifaat.ietf=40gmail.com&gt;
<br>To: oauth &lt;oauth=40ietf.org&gt;
<br>Subject: =5BOAUTH-WG=5D Shepherd write-up for draft-ietf-oauth-mtls-1=
0
<br>Message-ID:
<br>	&lt;CAGL6epJ=46tkrawOYT2j-y6nZByLLed=46UttyQXQf=5FHydMWNCkLxA=40mail=
.gmail.com&gt;
<br>Content-Type: text/plain; charset=3D=22utf-8=22
<br>
<br>All,
<br>
<br>The following is the shepherd write-up for the draft-ietf-oauth-mtls-=
10
<br>document:
<br>https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteu=
p/
<br>
<br>Please, take a look and let us know if you have any comments.
<br>
<br>Regards,
<br> Rifaat &amp; Hannes
<br>-------------- next part --------------
<br>An HTML attachment was scrubbed...
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180721/08f5fd81/attachment.html&gt;
<br>
<br>------------------------------
<br>
<br>Message: 3
<br>Date: Sat, 21 Jul 2018 23:38:01 +0200
<br>=46rom: Torsten Lodderstedt &lt;torsten=40lodderstedt.net&gt;
<br>To: Rifaat Shekh-Yusef &lt;rifaat.ietf=40gmail.com&gt;
<br>Cc: oauth &lt;oauth=40ietf.org&gt;
<br>Subject: Re: =5BOAUTH-WG=5D Shepherd write-up for draft-ietf-oauth-mt=
ls-10
<br>Message-ID: &lt;570E9B49-9A42-453=46-8401-125=465986B8DE=40loddersted=
t.net&gt;
<br>Content-Type: text/plain; charset=3D=22utf-8=22
<br>
<br>Hi Rifaat,
<br>
<br>Berlin Group=3Fs Nextgen PSD2 Spec (https://docs.wixstatic.com/ugd/c2=
914b=5F5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS.
<br>
<br>kind regards,
<br>Torsten.
<br>
<br>&gt; Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef &lt;rifaat.iet=
f=40gmail.com&gt;:
<br>&gt; =20
<br>&gt; All,
<br>&gt; =20
<br>&gt; The following is the shepherd write-up for the drafts-ietf-oauth=
-mtls-10 document:
<br>&gt; https://datahttps://datatracker.ietf.org/doc/draft-ietf-oauth-mt=
ls/shepherdwriteup/tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwri=
teup/
<br>&gt; =20
<br>&gt; Please, take a look and let us know if you have any comments.
<br>&gt; =20
<br>&gt; Regards,
<br>&gt;  Rifaat &amp; Hannes
<br>&gt; =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=

<br>&gt; OAuth mailing list
<br>&gt; OAuth=40ietf.org
<br>&gt; https://www.ietf.org/mailman/listinfo/oauth
<br>-------------- next part --------------
<br>An HTML attachment was scrubbed...
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180721/a2574dc4/attachment.html&gt;
<br>-------------- next part --------------
<br>A non-text attachment was scrubbed...
<br>Name: smime.p7s
<br>Type: application/pkcs7-signature
<br>Size: 3717 bytes
<br>Desc: not available
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180721/a2574dc4/attachment.p7s&gt;
<br>
<br>------------------------------
<br>
<br>Message: 4
<br>Date: Sat, 21 Jul 2018 17:58:28 -0400
<br>=46rom: Rifaat Shekh-Yusef &lt;rifaat.ietf=40gmail.com&gt;
<br>To: Torsten Lodderstedt &lt;torsten=40lodderstedt.net&gt;
<br>Cc: oauth &lt;oauth=40ietf.org&gt;
<br>Subject: Re: =5BOAUTH-WG=5D Shepherd write-up for draft-ietf-oauth-mt=
ls-10
<br>Message-ID:
<br>	&lt;CAGL6epKpiQxtANnymsVwnWbTz7Uz79NQMsRE7fp9vK00fGJ-PA=40mail.gmail=
.com&gt;
<br>Content-Type: text/plain; charset=3D=22utf-8=22
<br>
<br>Thanks Torsten=21
<br>
<br>
<br>On Saturday, July 21, 2018, Torsten Lodderstedt &lt;torsten=40lodders=
tedt.net&gt;
<br>wrote:
<br>
<br>&gt; Hi Rifaat,
<br>&gt;
<br>&gt; Berlin Group=3Fs Nextgen PSD2 Spec (https://docs.wixstatic.com/u=
gd/c2914b=5F
<br>&gt; 5351b289bf844c6881e46ee3561d95bb.pdf) also refers to mTLS.
<br>&gt;
<br>&gt; kind regards,
<br>&gt; Torsten.
<br>&gt;
<br>&gt; Am 21.07.2018 um 23:25 schrieb Rifaat Shekh-Yusef &lt;rifaat.iet=
f=40gmail.com&gt;:
<br>&gt;
<br>&gt; All,
<br>&gt;
<br>&gt; The following is the shepherd write-up for the drafts-ietf-oauth=
-mtls-10
<br>&gt; document:
<br>&gt; https://data
<br>&gt; &lt;https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/sheph=
erdwriteup/&gt;
<br>&gt; https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdw=
riteup/
<br>&gt; tracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
<br>&gt; &lt;https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/sheph=
erdwriteup/&gt;
<br>&gt;
<br>&gt;
<br>&gt; Please, take a look and let us know if you have any comments.
<br>&gt;
<br>&gt; Regards,
<br>&gt;  Rifaat &amp; Hannes
<br>&gt;
<br>&gt; =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=

<br>&gt; OAuth mailing list
<br>&gt; OAuth=40ietf.org
<br>&gt; https://www.ietf.org/mailman/listinfo/oauth
<br>&gt;
<br>&gt;
<br>-------------- next part --------------
<br>An HTML attachment was scrubbed...
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180721/5fe9b9c5/attachment.html&gt;
<br>
<br>------------------------------
<br>
<br>Message: 5
<br>Date: Sun, 22 Jul 2018 08:53:44 -0600
<br>=46rom: Brian Campbell &lt;bcampbell=40pingidentity.com&gt;
<br>To: =46ilip Skokan &lt;panva.ip=40gmail.com&gt;
<br>Cc: oauth &lt;oauth=40ietf.org&gt;
<br>Subject: Re: =5BOAUTH-WG=5D regarding draft-ietf-oauth-jwsreq
<br>Message-ID:
<br>	&lt;CA+k3eCSLD4ago=5FUbXDN=3DEEOuJP6vEpsEZp=46+E0O8d59aLvO5LQ=40mail=
.gmail.com&gt;
<br>Content-Type: text/plain; charset=3D=22utf-8=22
<br>
<br>I believe =46ilip is correct on these.
<br>
<br>On Sat, Jul 21, 2018 at 1:03 PM, =46ilip Skokan &lt;panva.ip=40gmail.=
com&gt; wrote:
<br>
<br>&gt; Hello,
<br>&gt;
<br>&gt; about the mentioned content-types in the current draft *jwsreq-1=
6*
<br>&gt;
<br>&gt; in *section-10.4.1* - says to
<br>&gt;
<br>&gt; check the content type of the response is =22application/jose=22=

<br>&gt;
<br>&gt;
<br>&gt; I believe this should be application/jwt instead
<br>&gt;
<br>&gt; in *section-10.4.2* - says to
<br>&gt;
<br>&gt; check the content type of the response is =22application/json=22=

<br>&gt;
<br>&gt;
<br>&gt; I believe this should be application/jwt too
<br>&gt;
<br>&gt; Both to be in line with the example of fetch response from
<br>&gt; *section-5.2.3 *
<br>&gt;
<br>&gt; Best,
<br>&gt; *=46ilip Skokan*
<br>&gt;
<br>&gt; =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=

<br>&gt; OAuth mailing list
<br>&gt; OAuth=40ietf.org
<br>&gt; https://www.ietf.org/mailman/listinfo/oauth
<br>&gt;
<br>&gt;
<br>
<br>-- =20
<br>=5FCON=46IDENTIALITY NOTICE: This email may contain confidential and =
privileged =20
<br>material for the sole use of the intended recipient(s). Any review, u=
se, =20
<br>distribution or disclosure by others is strictly prohibited.=3F If yo=
u have =20
<br>received this communication in error, please notify the sender immedi=
ately =20
<br>by e-mail and delete the message and any file attachments from your =20
<br>computer. Thank you.=5F
<br>-------------- next part --------------
<br>An HTML attachment was scrubbed...
<br>URL: &lt;https://mailarchive.ietf.org/arch/browse/oauth/attachments/2=
0180722/332f031f/attachment.html&gt;
<br>
<br>------------------------------
<br>
<br>Subject: Digest =46ooter
<br>
<br>=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
<br>OAuth mailing list
<br>OAuth=40ietf.org
<br>https://www.ietf.org/mailman/listinfo/oauth
<br>
<br>
<br>------------------------------
<br>
<br>End of OAuth Digest, Vol 117, Issue 43
<br>**************************************
<br></pre></div></blockquote></div></div></body></html>
--5b54e7ad_6b8b4567_19c--


From nobody Sun Jul 22 14:14:01 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7133C130E2E for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 14:13:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 61Ah5o_yThbE for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 14:13:57 -0700 (PDT)
Received: from mail-it0-x22b.google.com (mail-it0-x22b.google.com [IPv6:2607:f8b0:4001:c0b::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AA50130DCE for <oauth@ietf.org>; Sun, 22 Jul 2018 14:13:57 -0700 (PDT)
Received: by mail-it0-x22b.google.com with SMTP id 72-v6so21372923itw.3 for <oauth@ietf.org>; Sun, 22 Jul 2018 14:13:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=fPH18bMoG6xug/P1aRP1YJMFTCgY5RYNJy5+JUKPomM=; b=FsrMvr1DlbWTJTvq/uEbztodk6vyP9woxmSvV66E0ZfVq2UfGtSwq1pV25M87OVcij RA5m0DPwQWdijH+3hGv7+dR7Mu6/COogl6Zg7RF+hS6kwVxpvjcrOuJxeloDhnJNS3SR 6ZUVeyQtKjNlKDXBqfb4mT3odJ/M26OMoFIcw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=fPH18bMoG6xug/P1aRP1YJMFTCgY5RYNJy5+JUKPomM=; b=nu2j8RUzmoJUrAyoBVhOJiskIOY4csYxW+MuzJCBGDonUUGOaFYQL1tq3PUdmvRths fetQGTgpRcrGEjZWNSRhIAt/g7Nd4oYMl+/C9pnI4rAv++wAC2UMWMh2iaxpizujaXyK lh032WQe+k3+KAu094c5kkgzhXtEATWTg5mPKdK6wlXrtrId/mMNlxVogYFbIK+eNviK l3TWwjhZ0MvwYE5uHp5pbnwzgleyB1v0ib1lKiLmn0VaDQLlbXo+1nVWbhj/MLdCc6a3 Je584/QOeQsh/DwSTEYx5+mCjTj9L7dvSukSGdEKIULoRhW3fxqQvcemszgvdPQ5lBBH h85g==
X-Gm-Message-State: AOUpUlFIe2VVfGiznGmeV47jLszp6Dp1gTWnWxHyPyKuOLeBBkgXHtM4 kJcuRLNmNQNDolUEZG36HvHr2Nc1LACz+5ZHRnWS3ue3QFUdDFzkpzpSRh9vlDPfB11ulpRisF+ 7EJaL9q9haBJW9w==
X-Google-Smtp-Source: AAOMgpfbmvEVMhoBfYlrf9T1gii9PDfU5/cDXqRv9xVHYU0crq7W78dWAcGW4+DzJLrQWlfv7ki94bRlLgph6OQMm84=
X-Received: by 2002:a02:3407:: with SMTP id x7-v6mr9432962jae.110.1532294036217;  Sun, 22 Jul 2018 14:13:56 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Sun, 22 Jul 2018 14:13:25 -0700 (PDT)
In-Reply-To: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>
References: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Sun, 22 Jul 2018 15:13:25 -0600
Message-ID: <CA+k3eCQ_Qxda41pA9NhxgU32E=u27LGeRzkUb1ZH5rJ_tu1V1w@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b87cba05719d0133"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/WPrsvHofw2xRSMYb8Rbq3NtoMVM>
Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 21:14:00 -0000

--000000000000b87cba05719d0133
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

In (1), could it maybe say "normative extensions" rather than "normative
changes"?

Also Ping Identity is two words (rather than "PingIdentity").

Otherwise, it looks great. Thanks Rifaat!

On Sat, Jul 21, 2018 at 3:25 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
wrote:

> All,
>
> The following is the shepherd write-up for the draft-ietf-oauth-mtls-10
> document:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
>
> Please, take a look and let us know if you have any comments.
>
> Regards,
>  Rifaat & Hannes
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000b87cba05719d0133
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>In (1), could it maybe say &quot;normative extensions=
&quot; rather than &quot;normative changes&quot;?</div><div><br></div><div>=
Also Ping Identity is two words (rather than &quot;PingIdentity&quot;).</di=
v><div><br></div><div>Otherwise, it looks great. Thanks Rifaat! <br> </div>=
</div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Sat, Jul=
 21, 2018 at 3:25 PM, Rifaat Shekh-Yusef <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt=
;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr">All,<div=
><br></div><div>The following is the shepherd write-up for the=C2=A0draft-i=
etf-oauth-mtls-10 document:</div><div><a href=3D"https://datatracker.ietf.o=
rg/doc/draft-ietf-oauth-mtls/shepherdwriteup/" target=3D"_blank">https://da=
tatracker.ietf.org/<wbr>doc/draft-ietf-oauth-mtls/<wbr>shepherdwriteup/</a>=
<br></div><div><br></div><div>Please, take a look and let us know if you ha=
ve any comments.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat &=
amp; Hannes</div></div>
<br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000b87cba05719d0133--


From nobody Sun Jul 22 14:53:49 2018
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07281131026 for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 14:53:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S_hocnd_muHn for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 14:53:44 -0700 (PDT)
Received: from mail-it0-x236.google.com (mail-it0-x236.google.com [IPv6:2607:f8b0:4001:c0b::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38D3D131025 for <oauth@ietf.org>; Sun, 22 Jul 2018 14:53:44 -0700 (PDT)
Received: by mail-it0-x236.google.com with SMTP id p81-v6so1222599itp.1 for <oauth@ietf.org>; Sun, 22 Jul 2018 14:53:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3EZcp6QTZoo/QHCbljEkSCF2Vxt8H7xN8fSZXa7uJwI=; b=mnOPLBRIOW8LNL0fV2gU4YWatECBHHKOg9PstaI4F4Qzf2k9zeXHDYOgFz2J9pdeLs l+am+yfcTb4mx4aES4MJYjk88GFDd1tzMumGJFEBqqeeqXDS6KSeAGfYLYAmW5Xv8bgA bEjNYXxJIjQIZbTZeFLN4j/JS19Gmqdo2iViCFYvJP4kSsag6UzHP5LITs0fV+Dv37Dd u17bcmSDWJ74Js+qyMzHnj0BVdAiATmgRONVUIlrWIVIDyDs+PtHR9PQl1i4s6/FHyEQ n0Hrl8O/5mBy1yBDcCr1akBJv3wwcrN7fCbyzvQasyY99+6OXboyn8CZ3ArwFaeUVqWZ xIuw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3EZcp6QTZoo/QHCbljEkSCF2Vxt8H7xN8fSZXa7uJwI=; b=Gs42KLBYCCZe153KQh2l/qiC8DdSSYsz5/zRb86U00MxzAbeLaiGtUDK/bLQI+2rCr 4iPLu6CgU/dHotTRciRhiYF2HQ5jbbqXCzEQ1J5d6VKxI6Xia/XYxoChd8cJVSW9yg5w A7guDW7jEkeBY86iM0loweCAOGH1IMM0RJug+cQBWlOEd3eqa3B1mVpd0EOA69QaTeTP 1/qKibtzY9/ow+rnDQfXME6oB0CUFn4IG7ubdhOW6MYmIYPsH3kyLTEfZbIpajzQ0oVr H30n789RvbPMBibsF6QXopUcq2nwnEwUn4A0e6LkiAjeGjfyVeB0Hv5rjWrxX1/uir/c o8eA==
X-Gm-Message-State: AOUpUlHnCC5xKkrCi/Xs+mLfjMnw8K4pchzRGdYzq8i2v3OuBJLuSirV cgCc7ytrpzvXKTQQvoUJsoWlQb0q8WxLdCd8EXQ=
X-Google-Smtp-Source: AAOMgpctTHZ2Pb9H3MdcFhs5r130lLHbLjT+0y+9cD6IUa7dz1RlJQonKeThVXH94HerxMSQBxbPEpLbOikcIu3k/jk=
X-Received: by 2002:a24:d358:: with SMTP id n85-v6mr8022770itg.67.1532296423607;  Sun, 22 Jul 2018 14:53:43 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epJFtkrawOYT2j-y6nZByLLedFUttyQXQf_HydMWNCkLxA@mail.gmail.com> <CA+k3eCQ_Qxda41pA9NhxgU32E=u27LGeRzkUb1ZH5rJ_tu1V1w@mail.gmail.com>
In-Reply-To: <CA+k3eCQ_Qxda41pA9NhxgU32E=u27LGeRzkUb1ZH5rJ_tu1V1w@mail.gmail.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 22 Jul 2018 17:53:32 -0400
Message-ID: <CAGL6ep+EYv0XzkQieeX7ZzB-e99WSakOrx5abotEje9z7HNg4Q@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000005114905719d9060"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/baCi5oTo-rtCje328w_I78VBkBc>
Subject: Re: [OAUTH-WG] Shepherd write-up for draft-ietf-oauth-mtls-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 21:53:47 -0000

--00000000000005114905719d9060
Content-Type: text/plain; charset="UTF-8"

Thanks Brian!

I have just made these two changes to the write-up.

Regards,
 Rifaat


On Sun, Jul 22, 2018 at 5:13 PM Brian Campbell <bcampbell@pingidentity.com>
wrote:

> In (1), could it maybe say "normative extensions" rather than "normative
> changes"?
>
> Also Ping Identity is two words (rather than "PingIdentity").
>
> Otherwise, it looks great. Thanks Rifaat!
>
> On Sat, Jul 21, 2018 at 3:25 PM, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com
> > wrote:
>
>> All,
>>
>> The following is the shepherd write-up for the draft-ietf-oauth-mtls-10
>> document:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shepherdwriteup/
>>
>> Please, take a look and let us know if you have any comments.
>>
>> Regards,
>>  Rifaat & Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.
> If you have received this communication in error, please notify the sender
> immediately by e-mail and delete the message and any file attachments from
> your computer. Thank you.*

--00000000000005114905719d9060
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks Brian!<div><br></div><div>I have just made these tw=
o changes to the write-up.</div><div><br></div><div>Regards,</div><div>=C2=
=A0Rifaat</div><div><br></div></div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr">On Sun, Jul 22, 2018 at 5:13 PM Brian Campbell &lt;<a href=3D"mail=
to:bcampbell@pingidentity.com">bcampbell@pingidentity.com</a>&gt; wrote:<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div>In (1), could i=
t maybe say &quot;normative extensions&quot; rather than &quot;normative ch=
anges&quot;?</div><div><br></div><div>Also Ping Identity is two words (rath=
er than &quot;PingIdentity&quot;).</div><div><br></div><div>Otherwise, it l=
ooks great. Thanks Rifaat! <br> </div></div><div class=3D"gmail_extra"><br>=
<div class=3D"gmail_quote">On Sat, Jul 21, 2018 at 3:25 PM, Rifaat Shekh-Yu=
sef <span dir=3D"ltr">&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=
=3D"_blank">rifaat.ietf@gmail.com</a>&gt;</span> wrote:<br><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pad=
ding-left:1ex"><div dir=3D"ltr">All,<div><br></div><div>The following is th=
e shepherd write-up for the=C2=A0draft-ietf-oauth-mtls-10 document:</div><d=
iv><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-oauth-mtls/shephe=
rdwriteup/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-o=
auth-mtls/shepherdwriteup/</a><br></div><div><br></div><div>Please, take a =
look and let us know if you have any comments.</div><div><br></div><div>Reg=
ards,</div><div>=C2=A0Rifaat &amp; Hannes</div></div>
<br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i></blockquote></div>

--00000000000005114905719d9060--


From nobody Sun Jul 22 15:02:44 2018
Return-Path: <ekr@rtfm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E072131030 for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 15:02:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDofixxpaE-L for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 15:02:36 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DEE313104C for <oauth@ietf.org>; Sun, 22 Jul 2018 15:02:35 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id a134-v6so5064211lfe.6 for <oauth@ietf.org>; Sun, 22 Jul 2018 15:02:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3WNjvG/kgFdLrwWLnW3xOKC36mY3Fjkn4lflLZtfwao=; b=AkxwgUfKKMExGTplVQERsXXIrHPnx8kPuV1f2bklgDoJ63/fgAUcW2qPGFKlNgmIBU cB/hTJXi+9DwM8Gvia4zBTXO/K3QMS3wFrNP7dldRgM5F2mJlSEBAhzWkVkusVnV3Vd0 Ol+V5KmpzojKqWmwqClSf+PoOH2mvcPnFrzsVR1rWHQg4dpilqgu0HUqODnBC/26vaV5 PXOJT9vR6Gzn93SNV1Exu3TqIILD4NlivAIetTZVQSY6qTWMQeGxDOAsBCM2bvFzsVeI nKj4SO3GiRNLW8eisWfEFydn7Hfu3//aHD0TKAJsCdWqEi6YGyqHft1kKQS9elnCF1r0 xpgA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3WNjvG/kgFdLrwWLnW3xOKC36mY3Fjkn4lflLZtfwao=; b=ZQ0mIPtc8VY6ZraLRg9h0xVLkAaeUOLV6KoJwVRvw8xBz/8MnaKD3HJX+dT6mHa256 9hZnHe1YKwflFBA2QsIwDRavUkogNJXkfPEE4P2sJBhfG/gVEttAnGO9NatTuUGthVVb RCcVevgfzNhmzx3p2l2Ej357w8+g52ICgGALCWgdLMQ+GgEHnxEKFMY+c09iCPXUx47G 8/oSjHmbF37B/wZ9DSKRApbnKsX4ZOo3q9+aXPAWZm3kZQXngF2hByPtGkMHLekLdNaX U+JizdnqOO0OLva0sRucKwXmdHwEk7EZnLW0vkBdjszczXgIa3kKgHWtBM9Y114ut5Em 674g==
X-Gm-Message-State: AOUpUlHPJx6HaZBixZq4JMtNXcFuqU1GwOpcAVC7L1BEdp63JYan0smn P0uNVNRlSjKOIqUkS6kIuDZYAA0CsxwejwCGjrXvJA==
X-Google-Smtp-Source: AAOMgpfawHP6sHN5Tfg+kqvt96EVXBiI0UBMfd10+GTgYbzx4smVbb3eQp/+hpvtlPO8OUGr8TFo8qvoui8mql1Vnxk=
X-Received: by 2002:a19:c403:: with SMTP id u3-v6mr5654883lff.87.1532296953675;  Sun, 22 Jul 2018 15:02:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab3:4091:0:0:0:0:0 with HTTP; Sun, 22 Jul 2018 15:01:52 -0700 (PDT)
In-Reply-To: <CA+k3eCTn_5KHF6CT=9OeEiUmU-HENqee3jQ89OscTO9vgMuJfw@mail.gmail.com>
References: <CABcZeBNQaqg3wFuo=w3h4k+bB44pEPnoR-zZYM+AR7YDA=O8Gg@mail.gmail.com> <CA+k3eCRDyn7-1KEVYai8b-G_bLQZGTgiS2VFG9W3NWy2Ttu-nw@mail.gmail.com> <ef06d115-b178-16c3-76ca-4693d273ae41@free.fr> <CA+k3eCTeBqPHTs_vUrFOcEOT3CHJptJN8m3_M3LDYyL=WrL5BA@mail.gmail.com> <CABRXCmxSY75_tSA6uE4jtMMeX4aXOGEzWBLhkKXOOgg9ZUNNuA@mail.gmail.com> <SN6PR00MB03015D1AAF670587060EE199F5910@SN6PR00MB0301.namprd00.prod.outlook.com> <CABRXCmy8WnhSYGSz+wu2NQvz1E2Jr_Jx-=cH=tM_xVT0UaQp6g@mail.gmail.com> <CA+k3eCQdyuFA6FKUg4onMPhQ6VxfcOQ6vLSW_GijLsF+NOBaSg@mail.gmail.com> <CABcZeBNReOvd-FFiEwf-M_zXoiKYTT2pcSGfyjVEYe4E6adMCw@mail.gmail.com> <CA+k3eCRBahGR2N6rUNtZrYASQhjNUU4-_HVCZp_XAKv70zkpTA@mail.gmail.com> <CABcZeBOk4haUG_omN-ED_WwpAmY2G5jW2O6MPfhGLojw9bQ2kQ@mail.gmail.com> <CA+k3eCSzRHuNsb=kDTLk1Y_o0NYRMgu5XxN+Ow1xjS9mMBm+NQ@mail.gmail.com> <CABcZeBMLAoMNLhSEoXRAvJVLcYajueL+zfLtNz+cAzk+EtoHCQ@mail.gmail.com> <CA+k3eCTn_5KHF6CT=9OeEiUmU-HENqee3jQ89OscTO9vgMuJfw@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 22 Jul 2018 15:01:52 -0700
Message-ID: <CABcZeBPaK0zXBxfXF9zWdp3TMY-r9nuWQbOpE3KzS=n8=kY=Yg@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
Cc: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000009d52f305719dafbe"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/zMyXo_cFuI4XMi2RxhhKRnXgDCw>
Subject: Re: [OAUTH-WG] Followup on draft-ietf-oauth-token-exchange-12.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 22:02:42 -0000

--0000000000009d52f305719dafbe
Content-Type: text/plain; charset="UTF-8"

This text is fine. I have issued IETF-LC.

On Mon, Jun 4, 2018 at 1:45 PM, Brian Campbell <bcampbell@pingidentity.com>
wrote:

> Thanks Eric, I've added text in the just submitted -14 saying that only
> the two ends of the chain are to be considered in access control policy
> decisions.
>
> diff:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-token-exchange-14
>
> htmlized:
> https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-14
>
>
> On Fri, Jun 1, 2018 at 10:02 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>
>> OK, well, it seems like it ought to say that that generator of the token
>> can expect that the RP will apply an access control policy that s the union
>> of the capabilities of the two ends of the chain -- and that while it might
>> be less it won't be more.
>>
>> -Ekr
>>
>>
>> On Fri, Jun 1, 2018 at 3:15 PM, Brian Campbell <
>> bcampbell@pingidentity.com> wrote:
>>
>>> I suspect that the vast majority of time C's permissions won't matter at
>>> all. But I do think there are legitimate cases where they might be
>>> considered in the policy decision. One general example I can think of is a
>>> customer service rep or administrator taking override type corrective
>>> action on an end-user's account or transaction information (A is the
>>> end-user and C is the customer service rep) that the user on their own
>>> wouldn't have permission to change.
>>>
>>> On Fri, Jun 1, 2018 at 3:47 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>>>
>>>> That would go a long way, I think. Do you think that C's permissions
>>>> matter at all? So, say that the resource is accessible to C but not A?
>>>>
>>>> -Ekr
>>>>
>>>>
>>>>
>>>>
>>>> On Fri, Jun 1, 2018 at 11:47 AM, Brian Campbell <
>>>> bcampbell@pingidentity.com> wrote:
>>>>
>>>>> Hi Eric,
>>>>>
>>>>> Apologies for my somewhat slow response. I've honestly been unsure of
>>>>> how else to try and address the comment/question. But will continue
>>>>> trying...
>>>>>
>>>>> My expectation would be that access control decisions would be made
>>>>> based on the subject of the token itself or on the current actor. And maybe
>>>>> a combination of both in some situations (like, for example, the actor is
>>>>> an administrator and the token allows admin level access to the stuff the
>>>>> token subject would normally have access to).  However, I don't believe
>>>>> that nested prior actors would or should be considered in access control
>>>>> decisions. The nesting is more just to express what has happened for
>>>>> auditing or tracking or the like. To be honest, the nesting was added in
>>>>> the draft largely because the structure naturally and easily allowed for it
>>>>> and it seemed like it might be useful information to convey in some cases.
>>>>>
>>>>> So in that A->B->C case (the claims of such a token would, I think,
>>>>> look like the JSON below), B *is not* giving C his authority. B is
>>>>> just noted in the token as having been involved previously.  While A is
>>>>> identified as the subject of the token and C is the current actor.
>>>>>
>>>>>     {
>>>>>       "aud":"... ,"iss":... , "exp":..., etc. etc. ...
>>>>>       "sub":"A",
>>>>>       "act":
>>>>>       {
>>>>>         "sub":"C",
>>>>>         "act":
>>>>>         {
>>>>>           "sub":"B"
>>>>>         }
>>>>>       }
>>>>>     }
>>>>>
>>>>>
>>>>> Would some text explicitly saying that only the token subject (top
>>>>> level sub and claims) and the party identified by the outermost "act" claim
>>>>> (the current actor) are to be considered in access control decisions
>>>>> address your concern?
>>>>>
>>>>>
>>>>> On Tue, May 29, 2018 at 4:19 PM, Eric Rescorla <ekr@rtfm.com> wrote:
>>>>>
>>>>>> Hi Brian,
>>>>>>
>>>>>> To be clear, I'm not opposing Delegation. My concern here is that we
>>>>>> have a chain of signed assertions and I'm trying to understand how I as a
>>>>>> consumer of those assertions am supposed to evaluate it.
>>>>>>
>>>>>> I don't think it's sufficient to just say that that the access
>>>>>> control rules are local policy, because then the entity generating the
>>>>>> signature has no way of knowing how its signature will be used.
>>>>>>
>>>>>> To go back to the case I gave in my initial e-mail, say we have a
>>>>>> chain A->B->C and a resource that A and C could ordinarily not access, but
>>>>>> B can. If C has this delegation, can C access the resource? I.e., is B
>>>>>> giving C his authority or just passing on A's authority? It seems pretty
>>>>>> important for B to know that before he gives the token to C.
>>>>>>
>>>>>> -Ekr
>>>>>>
>>>>>>
>>>>>> On Thu, May 17, 2018 at 11:06 AM, Brian Campbell <
>>>>>> bcampbell@pingidentity.com> wrote:
>>>>>>
>>>>>>> Delegation has been in the document since its inception and
>>>>>>> throughout the three and a half years as a working group document.
>>>>>>>
>>>>>>> From a process point of view, the document is now in AD Evaluation.
>>>>>>> I worked through a number of questions and clarifications with Eric (said
>>>>>>> AD), however he raised the particular questions that started this thread on
>>>>>>> the WG list. And I responded with an attempt at addressing those questions.
>>>>>>> That was about a month ago.
>>>>>>>
>>>>>>> Eric, was my explanation helpful in clarify anything for you? Is
>>>>>>> there some text that you'd like to see added? Something else? I'm unsure
>>>>>>> how to proceed but would like to move things forward.
>>>>>>>
>>>>>>>
>>>>>>> On Thu, May 17, 2018 at 8:03 AM, Bill Burke <bburke@redhat.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> This is an honest question: How important is the actor stuff to the
>>>>>>>> players involved?  Are people going to use it?  IMO, its an edge
>>>>>>>> case
>>>>>>>> and I think more important areas, like external token exchange
>>>>>>>> (realm
>>>>>>>> to realm, domain to domain) are being neglected.  I'm quite
>>>>>>>> unfamiliar
>>>>>>>> how consensus is reached in this WG or the IETF, so I hope I'm not
>>>>>>>> sounding rude.  Just trying to provide some constructive feedback.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Thu, May 17, 2018 at 9:26 AM, Mike Jones <
>>>>>>>> Michael.Jones@microsoft.com> wrote:
>>>>>>>> > Moving the actor claim to a separate specification would only
>>>>>>>> make things more complicated for developers.  There already plenty of OAuth
>>>>>>>> specs.  Needlessly adding another one will only make related things harder
>>>>>>>> to find.
>>>>>>>> >
>>>>>>>> > Just like in the JWT [RFC 7519] spec itself in which use of all
>>>>>>>> the claims is optional, use of the actor claim in this spec.  If you don't
>>>>>>>> need it, don't use it.  Just because some won't use it is no better an
>>>>>>>> argument for moving it to a different spec than the argument that JWT
>>>>>>>> should have defined each of its claims in different specs.  That would have
>>>>>>>> made things harder, not easier.
>>>>>>>> >
>>>>>>>> >                                 -- Mike
>>>>>>>> >
>>>>>>>> > -----Original Message-----
>>>>>>>> > From: OAuth <oauth-bounces@ietf.org> On Behalf Of Bill Burke
>>>>>>>> > Sent: Thursday, May 17, 2018 2:11 PM
>>>>>>>> > To: Brian Campbell <bcampbell@pingidentity.com>
>>>>>>>> > Cc: oauth <oauth@ietf.org>
>>>>>>>> > Subject: Re: [OAUTH-WG] Followup on draft-ietf-oauth-token-exchang
>>>>>>>> e-12.txt
>>>>>>>> >
>>>>>>>> > My personal opinion is that I'm glad this actor stuff is optional.
>>>>>>>> > For one, none of our users have asked for it and really only do
>>>>>>>> simple exchanges.  Secondly, the rules for who can exchange what for what
>>>>>>>> is controlled and defined within our AS.  Makes things a lot simpler on the
>>>>>>>> client.  I kind of wish the actor stuff would be defined in a separate
>>>>>>>> specification.  I don't see us implementing it unless users start asking us
>>>>>>>> to.
>>>>>>>> >
>>>>>>>> > On Wed, May 16, 2018 at 6:11 PM, Brian Campbell <
>>>>>>>> bcampbell@pingidentity.com> wrote:
>>>>>>>> >> Well, it's already called the "actor claim" so the claimed part
>>>>>>>> is
>>>>>>>> >> kind of implied. And "claimed actor claim" is a rather awkward.
>>>>>>>> >> Really, all JWT claims are "claimed something" but they don't
>>>>>>>> include
>>>>>>>> >> the "claimed" bit in the name. RFC 7519, for example, defines the
>>>>>>>> >> subject claim but not the claimed subject claim.
>>>>>>>> >>
>>>>>>>> >> On Fri, Apr 20, 2018 at 11:38 AM, Denis <denis.ietf@free.fr>
>>>>>>>> wrote:
>>>>>>>> >>>
>>>>>>>> >>> Brian,
>>>>>>>> >>>
>>>>>>>> >>> Eric said: "what is the RP supposed to do when they encounter
>>>>>>>> it?
>>>>>>>> >>> This seems kind of under specified".
>>>>>>>> >>>
>>>>>>>> >>> After reading your explanations below, it looks like the RP can
>>>>>>>> do
>>>>>>>> >>> anything he wants with the "actor".
>>>>>>>> >>> It is a "claimed actor" and, if we keep the concept, it should
>>>>>>>> be
>>>>>>>> >>> called as such. Such a claim cannot be verified.
>>>>>>>> >>> A RP could copy and paste that claim in an audit log. No
>>>>>>>> standard
>>>>>>>> >>> action related to the content of such a claim can be specified
>>>>>>>> in the
>>>>>>>> >>> spec. If the content of a "claimed actor" is used by the RP, it
>>>>>>>> >>> should be only used as an hint and thus be subject to other
>>>>>>>> >>> verifications which are not specified in this specification.
>>>>>>>> >>>
>>>>>>>> >>> Denis
>>>>>>>> >>>
>>>>>>>> >>> Eric, I realize you weren't particularly impressed by my prior
>>>>>>>> >>> statements about the actor claim but, for lack of knowing what
>>>>>>>> else
>>>>>>>> >>> to say, I'm going to kind of repeat what I said about it over
>>>>>>>> in the
>>>>>>>> >>> Phabricator tool and add a little color.
>>>>>>>> >>>
>>>>>>>> >>> The actor claim is intended as a way to express that delegation
>>>>>>>> has
>>>>>>>> >>> happened and identify the entities involved. Access control or
>>>>>>>> other
>>>>>>>> >>> decisions based on it are at the discretion of the consumer of
>>>>>>>> the
>>>>>>>> >>> token based on whatever policy might be in place.
>>>>>>>> >>>
>>>>>>>> >>> There are JWT claims that have concise processing rules with
>>>>>>>> respect
>>>>>>>> >>> to whether or not the JWT can be accepted as valid. Some
>>>>>>>> examples are "aud"
>>>>>>>> >>> (Audience), "exp" (Expiration Time), and "nbf" (Not Before)
>>>>>>>> from RFC 7519.
>>>>>>>> >>> E.g. if the token is expired or was intended for someone or
>>>>>>>> something
>>>>>>>> >>> else, reject it.
>>>>>>>> >>>
>>>>>>>> >>> And there are JWT claims that appropriately don't specify such
>>>>>>>> >>> processing rules and are solely statements of fact or
>>>>>>>> circumstance.
>>>>>>>> >>> Also from RFC 7519, the "sub" (Subject) and "iat" (Issued At)
>>>>>>>> claims are good examples of such.
>>>>>>>> >>> There might be application or policy specific rules applied to
>>>>>>>> the
>>>>>>>> >>> content of those kinds of claims (e.g. only subjects from a
>>>>>>>> >>> particular organization are able to access tenant specific data
>>>>>>>> or,
>>>>>>>> >>> less realistic but still possible, disallow access for tokens
>>>>>>>> issued
>>>>>>>> >>> outside of regular business
>>>>>>>> >>> hours) but that's all outside the scope of a specification's
>>>>>>>> >>> definition of the claim.
>>>>>>>> >>>
>>>>>>>> >>> The actor claim falls into the latter category. It's a way for
>>>>>>>> the
>>>>>>>> >>> issuer of the token to tell the consumer of the token what is
>>>>>>>> going
>>>>>>>> >>> on. But any action to take (or not) based on that information
>>>>>>>> is at
>>>>>>>> >>> the discretion of the token consumer. I honestly don't know it
>>>>>>>> could
>>>>>>>> >>> be anything more. And don't think it should be.
>>>>>>>> >>>
>>>>>>>> >>> There are two main expected uses of the actor claim (that I'm
>>>>>>>> aware
>>>>>>>> >>> of
>>>>>>>> >>> anyway) that describing here might help. Maybe. One is a human
>>>>>>>> to
>>>>>>>> >>> human delegation case like a customer service rep doing
>>>>>>>> something on
>>>>>>>> >>> behalf of an end user. The subject would be that user and the
>>>>>>>> actor
>>>>>>>> >>> would be the customer service rep. And there wouldn't be any
>>>>>>>> chaining
>>>>>>>> >>> or nesting of the actor. The other case is so called service
>>>>>>>> chaining
>>>>>>>> >>> where a system might exchange a token it receives for a new
>>>>>>>> token
>>>>>>>> >>> that it can use to call a downstream service. And that service
>>>>>>>> in
>>>>>>>> >>> turn might do another exchange to get a new token suitable to
>>>>>>>> call
>>>>>>>> >>> yet another downstream service. And again and so on and turtles
>>>>>>>> all
>>>>>>>> >>> the way. I'm not necessarily endorsing that level of
>>>>>>>> granularity in
>>>>>>>> >>> chaining but it's bound to happen somewhere/sometime. The nested
>>>>>>>> >>> actor claim is able to express that all that has happened with
>>>>>>>> the
>>>>>>>> >>> top level or outermost one being the system currently using the
>>>>>>>> token
>>>>>>>> >>> and prior systems being nested.. What actually gets done with
>>>>>>>> that
>>>>>>>> >>> information is up to the respective systems involved. There
>>>>>>>> might be
>>>>>>>> >>> policy about what system is allowed to call what other system
>>>>>>>> that is
>>>>>>>> >>> enforced. Or maybe the info is just written to an audit log
>>>>>>>> >>> somewhere. Or something else. I don't know. But whatever it is
>>>>>>>> application/deployment/policy dependent and not specifiable by a spec.
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>> On Fri, Apr 13, 2018 at 6:38 PM, Eric Rescorla <ekr@rtfm.com>
>>>>>>>> wrote:
>>>>>>>> >>>>
>>>>>>>> >>>> Hi folks,
>>>>>>>> >>>>
>>>>>>>> >>>> I've gone over draft-ietf-oauth-token-exchange-12 and things
>>>>>>>> seem
>>>>>>>> >>>> generally OK. I do still have one remaining concern, which is
>>>>>>>> about
>>>>>>>> >>>> the actor claim. Specifically, what is the RP supposed to do
>>>>>>>> when
>>>>>>>> >>>> they encounter it? This seems kind of underspecified.
>>>>>>>> >>>>
>>>>>>>> >>>> In particular:
>>>>>>>> >>>>
>>>>>>>> >>>> 1. What facts am I supposed to know here? Merely that everyone
>>>>>>>> in
>>>>>>>> >>>>    the chain signed off on the next person in the chain acting
>>>>>>>> as them?
>>>>>>>> >>>>
>>>>>>>> >>>> 2. Am I just supposed to pretend that the person presenting
>>>>>>>> the token
>>>>>>>> >>>>    is the identity at the top of the chain? Say I have the
>>>>>>>> >>>>    delegation A -> B -> C, and there is some resource which
>>>>>>>> >>>>    B can access but A and C cannot, should I give access?
>>>>>>>> >>>>
>>>>>>>> >>>> I think the first question definitely needs an answer. The
>>>>>>>> second
>>>>>>>> >>>> question I guess we could make not answer, but it's pretty
>>>>>>>> hard to
>>>>>>>> >>>> know how to make a system with this left open..
>>>>>>>> >>>>
>>>>>>>> >>>> -Ekr
>>>>>>>> >>>>
>>>>>>>> >>>>
>>>>>>>> >>>> _______________________________________________
>>>>>>>> >>>> OAuth mailing list
>>>>>>>> >>>> OAuth@ietf.org
>>>>>>>> >>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> >>>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>> CONFIDENTIALITY NOTICE: This email may contain confidential and
>>>>>>>> >>> privileged material for the sole use of the intended
>>>>>>>> recipient(s).
>>>>>>>> >>> Any review, use, distribution or disclosure by others is
>>>>>>>> strictly
>>>>>>>> >>> prohibited..  If you have received this communication in error,
>>>>>>>> >>> please notify the sender immediately by e-mail and delete the
>>>>>>>> message
>>>>>>>> >>> and any file attachments from your computer. Thank you.
>>>>>>>> >>>
>>>>>>>> >>> _______________________________________________
>>>>>>>> >>> OAuth mailing list
>>>>>>>> >>> OAuth@ietf.org
>>>>>>>> >>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>>
>>>>>>>> >>> _______________________________________________
>>>>>>>> >>> OAuth mailing list
>>>>>>>> >>> OAuth@ietf.org
>>>>>>>> >>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> >>>
>>>>>>>> >>
>>>>>>>> >>
>>>>>>>> >> CONFIDENTIALITY NOTICE: This email may contain confidential and
>>>>>>>> >> privileged material for the sole use of the intended
>>>>>>>> recipient(s). Any
>>>>>>>> >> review, use, distribution or disclosure by others is strictly
>>>>>>>> >> prohibited..  If you have received this communication in error,
>>>>>>>> please
>>>>>>>> >> notify the sender immediately by e-mail and delete the message
>>>>>>>> and any
>>>>>>>> >> file attachments from your computer. Thank you.
>>>>>>>> >> _______________________________________________
>>>>>>>> >> OAuth mailing list
>>>>>>>> >> OAuth@ietf.org
>>>>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> >>
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > --
>>>>>>>> > Bill Burke
>>>>>>>> > Red Hat
>>>>>>>> >
>>>>>>>> > _______________________________________________
>>>>>>>> > OAuth mailing list
>>>>>>>> > OAuth@ietf.org
>>>>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>> Bill Burke
>>>>>>>> Red Hat
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>>>>>>> privileged material for the sole use of the intended recipient(s). Any
>>>>>>> review, use, distribution or disclosure by others is strictly prohibited.
>>>>>>> If you have received this communication in error, please notify the sender
>>>>>>> immediately by e-mail and delete the message and any file attachments from
>>>>>>> your computer. Thank you.*
>>>>>>
>>>>>>
>>>>>>
>>>>>
>>>>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>>>>> privileged material for the sole use of the intended recipient(s). Any
>>>>> review, use, distribution or disclosure by others is strictly prohibited.
>>>>> If you have received this communication in error, please notify the sender
>>>>> immediately by e-mail and delete the message and any file attachments from
>>>>> your computer. Thank you.*
>>>>>
>>>>
>>>>
>>>
>>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>>> privileged material for the sole use of the intended recipient(s). Any
>>> review, use, distribution or disclosure by others is strictly prohibited.
>>> If you have received this communication in error, please notify the sender
>>> immediately by e-mail and delete the message and any file attachments from
>>> your computer. Thank you.*
>>>
>>
>>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.
> If you have received this communication in error, please notify the sender
> immediately by e-mail and delete the message and any file attachments from
> your computer. Thank you.*
>

--0000000000009d52f305719dafbe
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">This text is fine. I have issued IETF-LC.<br></div><div cl=
ass=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jun 4, 2018 at 1=
:45 PM, Brian Campbell <span dir=3D"ltr">&lt;<a href=3D"mailto:bcampbell@pi=
ngidentity.com" target=3D"_blank">bcampbell@pingidentity.com</a>&gt;</span>=
 wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div>Thanks Eric=
, I&#39;ve added text in the just submitted -14 saying that only the two en=
ds of the chain are to be considered in access control policy decisions. <b=
r></div><div><br></div><div>diff:<br></div><div><a href=3D"https://www.ietf=
.org/rfcdiff?url2=3Ddraft-ietf-oauth-token-exchange-14" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/rfcdiff?u<wbr>rl2=3Ddraft-ietf-oauth=
-token-exc<wbr>hange-14</a> <br></div><div><br></div><div>htmlized:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-14" =
rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/dr<wbr>aft=
-ietf-oauth-token-exchange-<wbr>14</a></div><div><br></div></div><div class=
=3D"HOEnZb"><div class=3D"h5"><div class=3D"gmail_extra"><br><div class=3D"=
gmail_quote">On Fri, Jun 1, 2018 at 10:02 PM, Eric Rescorla <span dir=3D"lt=
r">&lt;<a href=3D"mailto:ekr@rtfm.com" target=3D"_blank">ekr@rtfm.com</a>&g=
t;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div>OK=
, well, it seems like it ought to say that that generator of the token can =
expect that the RP will apply an access control policy that s the union of =
the capabilities of the two ends of the chain -- and that while it might be=
 less it won&#39;t be more.<br></div><div><br></div><div>-Ekr</div><div><br=
></div></div><div class=3D"m_185076214864120648HOEnZb"><div class=3D"m_1850=
76214864120648h5"><div class=3D"gmail_extra"><br><div class=3D"gmail_quote"=
>On Fri, Jun 1, 2018 at 3:15 PM, Brian Campbell <span dir=3D"ltr">&lt;<a hr=
ef=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingid=
entity.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=
=3D"ltr"><div>I suspect that the vast majority of time C&#39;s permissions =
won&#39;t matter at all. But I do think there are legitimate cases where th=
ey might be considered in the policy decision. One general example I can th=
ink of is a customer service rep or administrator taking override type corr=
ective action on an end-user&#39;s account or transaction information (A is=
 the end-user and C is the customer service rep) that the user on their own=
 wouldn&#39;t have permission to change. =C2=A0 <br></div></div><div class=
=3D"m_185076214864120648m_4117626487437328750HOEnZb"><div class=3D"m_185076=
214864120648m_4117626487437328750h5"><div class=3D"gmail_extra"><br><div cl=
ass=3D"gmail_quote">On Fri, Jun 1, 2018 at 3:47 PM, Eric Rescorla <span dir=
=3D"ltr">&lt;<a href=3D"mailto:ekr@rtfm.com" target=3D"_blank">ekr@rtfm.com=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr"><=
div>That would go a long way, I think. Do you think that C&#39;s permission=
s matter at all? So, say that the resource is accessible to C but not A?<br=
></div><div><br></div><div>-Ekr</div><div><br></div><div><br></div><div><br=
></div></div><div class=3D"m_185076214864120648m_4117626487437328750m_20133=
90948615437533HOEnZb"><div class=3D"m_185076214864120648m_41176264874373287=
50m_2013390948615437533h5"><div class=3D"gmail_extra"><br><div class=3D"gma=
il_quote">On Fri, Jun 1, 2018 at 11:47 AM, Brian Campbell <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampb=
ell@pingidentity.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
"><div dir=3D"ltr"><div>Hi Eric, <br></div><div><br></div><div>Apologies fo=
r my somewhat slow response. I&#39;ve honestly been unsure of how else to t=
ry and address the comment/question. But will continue trying...=C2=A0 <br>=
</div><div><br></div><div>My expectation would be that access control decis=
ions would be made based on the subject of the token itself or on the curre=
nt actor. And maybe a combination of both in some situations (like, for exa=
mple, the actor is an administrator and the token allows admin level access=
 to the stuff the token subject would normally have access to).=C2=A0 Howev=
er, I don&#39;t believe that nested prior actors would or should be conside=
red in access control decisions. The nesting is more just to express what h=
as happened for auditing or tracking or the like. To be honest, the nesting=
 was added in the draft largely because the structure naturally and easily =
allowed for it and it seemed like it might be useful information to convey =
in some cases. <br></div><div><br></div><div>So in that A-&gt;B-&gt;C case =
(the claims of such a token would, I think, look like the JSON below), B <b=
>is not</b> giving C his=C2=A0authority. B is just noted in the token as ha=
ving been involved previously.=C2=A0 While A is identified as the subject o=
f the token and C is the current actor. <br></div><div><br></div><div><pre =
class=3D"m_185076214864120648m_4117626487437328750m_2013390948615437533m_-1=
582878555692439640m_5377743870565981629gmail-m_8378560348234984766gmail-m_6=
369459926104603262m_842893421122832003gmail-m_3377091152811425824gmail-newp=
age">    {
      &quot;aud&quot;:&quot;... ,&quot;iss&quot;:... , &quot;exp&quot;:...,=
 etc. etc. ...
      &quot;sub&quot;:&quot;A&quot;,
      &quot;act&quot;:
      {
        &quot;sub&quot;:&quot;C&quot;,
        &quot;act&quot;:
        {
          &quot;sub&quot;:&quot;B&quot;
        }
      }
    }</pre><br></div><div>Would some text explicitly saying that only the t=
oken subject (top level sub and claims) and the party identified by the out=
ermost &quot;act&quot; claim (the current actor) are to be considered in ac=
cess control decisions address your concern? <br></div><div><br></div></div=
><div class=3D"m_185076214864120648m_4117626487437328750m_20133909486154375=
33m_-1582878555692439640HOEnZb"><div class=3D"m_185076214864120648m_4117626=
487437328750m_2013390948615437533m_-1582878555692439640h5"><div class=3D"gm=
ail_extra"><br><div class=3D"gmail_quote">On Tue, May 29, 2018 at 4:19 PM, =
Eric Rescorla <span dir=3D"ltr">&lt;<a href=3D"mailto:ekr@rtfm.com" target=
=3D"_blank">ekr@rtfm.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex"><div dir=3D"ltr"><div>Hi Brian,</div><div><br></div><div>To be clear,=
 I&#39;m not opposing Delegation. My concern here is that we have a chain o=
f signed assertions and I&#39;m trying to understand how I as a consumer of=
 those assertions am supposed to evaluate it.</div><div><br></div><div>I do=
n&#39;t think it&#39;s sufficient to just say that that the access control =
rules are local policy, because then the entity generating the signature ha=
s no way of knowing how its signature will be used.</div><div><br></div><di=
v>To go back to the case I gave in my initial e-mail, say we have a chain A=
-&gt;B-&gt;C and a resource that A and C could ordinarily not access, but B=
 can. If C has this delegation, can C access the resource? I.e., is B givin=
g C his authority or just passing on A&#39;s authority? It seems pretty imp=
ortant for B to know that before he gives the token to C.<br></div><div><br=
></div><div>-Ekr</div><div><br></div></div><div class=3D"gmail_extra"><br><=
div class=3D"gmail_quote"><div><div class=3D"m_185076214864120648m_41176264=
87437328750m_2013390948615437533m_-1582878555692439640m_5377743870565981629=
h5">On Thu, May 17, 2018 at 11:06 AM, Brian Campbell <span dir=3D"ltr">&lt;=
<a href=3D"mailto:bcampbell@pingidentity.com" target=3D"_blank">bcampbell@p=
ingidentity.com</a>&gt;</span> wrote:<br></div></div><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex"><div><div class=3D"m_185076214864120648m_4117626487437328750m_2013=
390948615437533m_-1582878555692439640m_5377743870565981629h5"><div dir=3D"l=
tr"><div>Delegation has been in the document since its inception and throug=
hout the three and a half years as a working group document. <br></div><div=
><br></div><div>From a process point of view, the document is now in=C2=A0A=
D Evaluation. I worked through a number of questions and clarifications wit=
h Eric (said AD), however he raised the particular questions that started t=
his thread on the WG list. And I responded with an attempt at addressing th=
ose questions. That was about a month ago. <br></div><div><br></div><div>Er=
ic, was my explanation helpful in clarify anything for you? Is there some t=
ext that you&#39;d like to see added? Something else? I&#39;m unsure how to=
 proceed but would like to move things forward.<br></div><div><div class=3D=
"m_185076214864120648m_4117626487437328750m_2013390948615437533m_-158287855=
5692439640m_5377743870565981629m_-5039242635228001560h5"><br><div class=3D"=
gmail_extra"><br><div class=3D"gmail_quote">On Thu, May 17, 2018 at 8:03 AM=
, Bill Burke <span dir=3D"ltr">&lt;<a href=3D"mailto:bburke@redhat.com" tar=
get=3D"_blank">bburke@redhat.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">This is an honest question: How important is the actor stuff =
to the<br>
players involved?=C2=A0 Are people going to use it?=C2=A0 IMO, its an edge =
case<br>
and I think more important areas, like external token exchange (realm<br>
to realm, domain to domain) are being neglected.=C2=A0 I&#39;m quite unfami=
liar<br>
how consensus is reached in this WG or the IETF, so I hope I&#39;m not<br>
sounding rude.=C2=A0 Just trying to provide some constructive feedback.<br>
<div class=3D"m_185076214864120648m_4117626487437328750m_201339094861543753=
3m_-1582878555692439640m_5377743870565981629m_-5039242635228001560m_3475631=
084761990249m_-307576368905976843m_6870922798043245318m_5069623183765691108=
HOEnZb"><div class=3D"m_185076214864120648m_4117626487437328750m_2013390948=
615437533m_-1582878555692439640m_5377743870565981629m_-5039242635228001560m=
_3475631084761990249m_-307576368905976843m_6870922798043245318m_50696231837=
65691108h5"><br>
<br>
<br>
On Thu, May 17, 2018 at 9:26 AM, Mike Jones &lt;<a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt; w=
rote:<br>
&gt; Moving the actor claim to a separate specification would only make thi=
ngs more complicated for developers.=C2=A0 There already plenty of OAuth sp=
ecs.=C2=A0 Needlessly adding another one will only make related things hard=
er to find.<br>
&gt;<br>
&gt; Just like in the JWT [RFC 7519] spec itself in which use of all the cl=
aims is optional, use of the actor claim in this spec.=C2=A0 If you don&#39=
;t need it, don&#39;t use it.=C2=A0 Just because some won&#39;t use it is n=
o better an argument for moving it to a different spec than the argument th=
at JWT should have defined each of its claims in different specs.=C2=A0 Tha=
t would have made things harder, not easier.<br>
&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0-- Mike<br>
&gt;<br>
&gt; -----Original Message-----<br>
&gt; From: OAuth &lt;<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_b=
lank">oauth-bounces@ietf.org</a>&gt; On Behalf Of Bill Burke<br>
&gt; Sent: Thursday, May 17, 2018 2:11 PM<br>
&gt; To: Brian Campbell &lt;<a href=3D"mailto:bcampbell@pingidentity.com" t=
arget=3D"_blank">bcampbell@pingidentity.com</a>&gt;<br>
&gt; Cc: oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oaut=
h@ietf.org</a>&gt;<br>
&gt; Subject: Re: [OAUTH-WG] Followup on draft-ietf-oauth-token-exchang<wbr=
>e-12.txt<br>
&gt;<br>
&gt; My personal opinion is that I&#39;m glad this actor stuff is optional.=
<br>
&gt; For one, none of our users have asked for it and really only do simple=
 exchanges.=C2=A0 Secondly, the rules for who can exchange what for what is=
 controlled and defined within our AS.=C2=A0 Makes things a lot simpler on =
the client.=C2=A0 I kind of wish the actor stuff would be defined in a sepa=
rate specification.=C2=A0 I don&#39;t see us implementing it unless users s=
tart asking us to.<br>
&gt;<br>
&gt; On Wed, May 16, 2018 at 6:11 PM, Brian Campbell &lt;<a href=3D"mailto:=
bcampbell@pingidentity.com" target=3D"_blank">bcampbell@pingidentity.com</a=
>&gt; wrote:<br>
&gt;&gt; Well, it&#39;s already called the &quot;actor claim&quot; so the c=
laimed part is<br>
&gt;&gt; kind of implied. And &quot;claimed actor claim&quot; is a rather a=
wkward.<br>
&gt;&gt; Really, all JWT claims are &quot;claimed something&quot; but they =
don&#39;t include<br>
&gt;&gt; the &quot;claimed&quot; bit in the name. RFC 7519, for example, de=
fines the<br>
&gt;&gt; subject claim but not the claimed subject claim.<br>
&gt;&gt;<br>
&gt;&gt; On Fri, Apr 20, 2018 at 11:38 AM, Denis &lt;<a href=3D"mailto:deni=
s.ietf@free.fr" target=3D"_blank">denis.ietf@free.fr</a>&gt; wrote:<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Brian,<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Eric said: &quot;what is the RP supposed to do when they encou=
nter it?<br>
&gt;&gt;&gt; This seems kind of under specified&quot;.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; After reading your explanations below, it looks like the RP ca=
n do<br>
&gt;&gt;&gt; anything he wants with the &quot;actor&quot;.<br>
&gt;&gt;&gt; It is a &quot;claimed actor&quot; and, if we keep the concept,=
 it should be<br>
&gt;&gt;&gt; called as such. Such a claim cannot be verified.<br>
&gt;&gt;&gt; A RP could copy and paste that claim in an audit log. No stand=
ard<br>
&gt;&gt;&gt; action related to the content of such a claim can be specified=
 in the<br>
&gt;&gt;&gt; spec. If the content of a &quot;claimed actor&quot; is used by=
 the RP, it<br>
&gt;&gt;&gt; should be only used as an hint and thus be subject to other<br=
>
&gt;&gt;&gt; verifications which are not specified in this specification.<b=
r>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Denis<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Eric, I realize you weren&#39;t particularly impressed by my p=
rior<br>
&gt;&gt;&gt; statements about the actor claim but, for lack of knowing what=
 else<br>
&gt;&gt;&gt; to say, I&#39;m going to kind of repeat what I said about it o=
ver in the<br>
&gt;&gt;&gt; Phabricator tool and add a little color.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The actor claim is intended as a way to express that delegatio=
n has<br>
&gt;&gt;&gt; happened and identify the entities involved. Access control or=
 other<br>
&gt;&gt;&gt; decisions based on it are at the discretion of the consumer of=
 the<br>
&gt;&gt;&gt; token based on whatever policy might be in place.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; There are JWT claims that have concise processing rules with r=
espect<br>
&gt;&gt;&gt; to whether or not the JWT can be accepted as valid. Some examp=
les are &quot;aud&quot;<br>
&gt;&gt;&gt; (Audience), &quot;exp&quot; (Expiration Time), and &quot;nbf&q=
uot; (Not Before) from RFC 7519.<br>
&gt;&gt;&gt; E.g. if the token is expired or was intended for someone or so=
mething<br>
&gt;&gt;&gt; else, reject it.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; And there are JWT claims that appropriately don&#39;t specify =
such<br>
&gt;&gt;&gt; processing rules and are solely statements of fact or circumst=
ance.<br>
&gt;&gt;&gt; Also from RFC 7519, the &quot;sub&quot; (Subject) and &quot;ia=
t&quot; (Issued At) claims are good examples of such.<br>
&gt;&gt;&gt; There might be application or policy specific rules applied to=
 the<br>
&gt;&gt;&gt; content of those kinds of claims (e.g. only subjects from a<br=
>
&gt;&gt;&gt; particular organization are able to access tenant specific dat=
a or,<br>
&gt;&gt;&gt; less realistic but still possible, disallow access for tokens =
issued<br>
&gt;&gt;&gt; outside of regular business<br>
&gt;&gt;&gt; hours) but that&#39;s all outside the scope of a specification=
&#39;s<br>
&gt;&gt;&gt; definition of the claim.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The actor claim falls into the latter category. It&#39;s a way=
 for the<br>
&gt;&gt;&gt; issuer of the token to tell the consumer of the token what is =
going<br>
&gt;&gt;&gt; on. But any action to take (or not) based on that information =
is at<br>
&gt;&gt;&gt; the discretion of the token consumer. I honestly don&#39;t kno=
w it could<br>
&gt;&gt;&gt; be anything more. And don&#39;t think it should be.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; There are two main expected uses of the actor claim (that I&#3=
9;m aware<br>
&gt;&gt;&gt; of<br>
&gt;&gt;&gt; anyway) that describing here might help. Maybe. One is a human=
 to<br>
&gt;&gt;&gt; human delegation case like a customer service rep doing someth=
ing on<br>
&gt;&gt;&gt; behalf of an end user. The subject would be that user and the =
actor<br>
&gt;&gt;&gt; would be the customer service rep. And there wouldn&#39;t be a=
ny chaining<br>
&gt;&gt;&gt; or nesting of the actor. The other case is so called service c=
haining<br>
&gt;&gt;&gt; where a system might exchange a token it receives for a new to=
ken<br>
&gt;&gt;&gt; that it can use to call a downstream service. And that service=
 in<br>
&gt;&gt;&gt; turn might do another exchange to get a new token suitable to =
call<br>
&gt;&gt;&gt; yet another downstream service. And again and so on and turtle=
s all<br>
&gt;&gt;&gt; the way. I&#39;m not necessarily endorsing that level of granu=
larity in<br>
&gt;&gt;&gt; chaining but it&#39;s bound to happen somewhere/sometime. The =
nested<br>
&gt;&gt;&gt; actor claim is able to express that all that has happened with=
 the<br>
&gt;&gt;&gt; top level or outermost one being the system currently using th=
e token<br>
&gt;&gt;&gt; and prior systems being nested.. What actually gets done with =
that<br>
&gt;&gt;&gt; information is up to the respective systems involved. There mi=
ght be<br>
&gt;&gt;&gt; policy about what system is allowed to call what other system =
that is<br>
&gt;&gt;&gt; enforced. Or maybe the info is just written to an audit log<br=
>
&gt;&gt;&gt; somewhere. Or something else. I don&#39;t know. But whatever i=
t is application/deployment/policy dependent and not specifiable by a spec.=
<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; On Fri, Apr 13, 2018 at 6:38 PM, Eric Rescorla &lt;<a href=3D"=
mailto:ekr@rtfm.com" target=3D"_blank">ekr@rtfm.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Hi folks,<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I&#39;ve gone over draft-ietf-oauth-token-exchang<wbr>e-12=
 and things seem<br>
&gt;&gt;&gt;&gt; generally OK. I do still have one remaining concern, which=
 is about<br>
&gt;&gt;&gt;&gt; the actor claim. Specifically, what is the RP supposed to =
do when<br>
&gt;&gt;&gt;&gt; they encounter it? This seems kind of underspecified.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; In particular:<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; 1. What facts am I supposed to know here? Merely that ever=
yone in<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 the chain signed off on the next person in th=
e chain acting as them?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; 2. Am I just supposed to pretend that the person presentin=
g the token<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 is the identity at the top of the chain? Say =
I have the<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 delegation A -&gt; B -&gt; C, and there is so=
me resource which<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 B can access but A and C cannot, should I giv=
e access?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I think the first question definitely needs an answer. The=
 second<br>
&gt;&gt;&gt;&gt; question I guess we could make not answer, but it&#39;s pr=
etty hard to<br>
&gt;&gt;&gt;&gt; know how to make a system with this left open..<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; -Ekr<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@=
ietf.org</a><br>
&gt;&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" re=
l=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istin=
fo/oauth</a><br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; CONFIDENTIALITY NOTICE: This email may contain confidential an=
d<br>
&gt;&gt;&gt; privileged material for the sole use of the intended recipient=
(s).<br>
&gt;&gt;&gt; Any review, use, distribution or disclosure by others is stric=
tly<br>
&gt;&gt;&gt; prohibited..=C2=A0 If you have received this communication in =
error,<br>
&gt;&gt;&gt; please notify the sender immediately by e-mail and delete the =
message<br>
&gt;&gt;&gt; and any file attachments from your computer. Thank you.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf=
.org</a><br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D=
"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/o=
auth</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt;&gt; OAuth mailing list<br>
&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf=
.org</a><br>
&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D=
"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/o=
auth</a><br>
&gt;&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;&gt; CONFIDENTIALITY NOTICE: This email may contain confidential and<br=
>
&gt;&gt; privileged material for the sole use of the intended recipient(s).=
 Any<br>
&gt;&gt; review, use, distribution or disclosure by others is strictly<br>
&gt;&gt; prohibited..=C2=A0 If you have received this communication in erro=
r, please<br>
&gt;&gt; notify the sender immediately by e-mail and delete the message and=
 any<br>
&gt;&gt; file attachments from your computer. Thank you.<br>
&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt; OAuth mailing list<br>
&gt;&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org=
</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"nor=
eferrer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth=
</a><br>
&gt;&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; --<br>
&gt; Bill Burke<br>
&gt; Red Hat<br>
&gt;<br>
&gt; ______________________________<wbr>_________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>=
<br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"norefer=
rer" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a>=
<br>
<br>
<br>
<br>
-- <br>
Bill Burke<br>
Red Hat<br>
</div></div></blockquote></div><br></div></div></div></div>

<br>
</div></div><i style=3D"margin:0px;padding:0px;border:0px;outline:0px;verti=
cal-align:baseline;background:rgb(255,255,255);font-family:proxima-nova-zen=
desk,system-ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-S=
ans,Ubuntu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(=
85,85,85)"><span style=3D"margin:0px;padding:0px;border:0px;outline:0px;ver=
tical-align:baseline;background:transparent;font-family:proxima-nova-zendes=
k,system-ui,-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Ox=
ygen-Sans,Ubuntu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font=
-weight:600"><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contai=
n confidential and privileged material for the sole use of the intended rec=
ipient(s). Any review, use, distribution or disclosure by others is strictl=
y prohibited.=C2=A0 If you have received this communication in error, pleas=
e notify the sender immediately by e-mail and delete the message and any fi=
le attachments from your computer. Thank you.</font></span></i></blockquote=
></div><br></div>
</blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i></div></div></blockquote=
></div><br></div>
</div></div></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i></div></div></blockquote=
></div><br></div>
</div></div></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i></div></div></blockquote=
></div><br></div>

--0000000000009d52f305719dafbe--


From nobody Sun Jul 22 15:53:16 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 315CD130E3C for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 15:53:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8X1nDDTbatye for <oauth@ietfa.amsl.com>; Sun, 22 Jul 2018 15:53:12 -0700 (PDT)
Received: from mail-pf1-x430.google.com (mail-pf1-x430.google.com [IPv6:2607:f8b0:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5F9B12426A for <oauth@ietf.org>; Sun, 22 Jul 2018 15:53:11 -0700 (PDT)
Received: by mail-pf1-x430.google.com with SMTP id a26-v6so532558pfo.4 for <oauth@ietf.org>; Sun, 22 Jul 2018 15:53:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=B6H7jkXjfqctHtXhUtBs+wlTUU6RfJcykkIIipZEtas=; b=kdN05g4l6AkNLfViIm6RiGxMpA+FBP782yQ9QhArN5AwWNEr3gLhNeIBEDqHF6Jp12 COFMvaBkwx8JMUsUpHpZjxaTtkD8yfOFZNeLeqHiEiW4vXRVCsVinFXdJzWddLpUmFCb K0AqKNmB5WR0IVxlmRy5f2mzhlETI71mqeRBxO0+0Lhl53tD830iG0AASe4uVjOqoYPL 8IRIHQD4IwCgIzvpz7vPJQ2s4d5KxbTilITdR03gDjk3YW0Mxrxt0D3q+exiXD83V8Kg +FwiqZTgyLJADmrR1jSS3wKdxXVb8oGRceFpa/dn6n8vcleNW4NYqqflSOEP8R3hZwsv j+9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=B6H7jkXjfqctHtXhUtBs+wlTUU6RfJcykkIIipZEtas=; b=E+OuIRyknO5tTFL0t9VyQHFmiaOrnRx8Qqh8i5CGv0mlEcHhQoeC289VYMupH5ZVIL ZQNnPG+/5hOgR/s4ffIryn4Lacwe98w4H8AgeyFdilMbSE4R4B8dBjokDZGVKg+t2A8d Mvg28oKh4wMjXB23un3ZOkdeVtjl0DcLd1C+8rN1WoJLj+K7E08u+cVf5pV1vVacNMbl FmocV7jlG9Obb7wVuIZdwrxk6AW6diZmNLcDcACp3DZX42Gyu3v+radsLqHmKbBxDqjd uKHLAWQjmX50L7Bx7DnS0TDI2I1uQQ+/I7JIuDj6edwTwlZUP2IGeew8AsW7RqzKA0tM H7tw==
X-Gm-Message-State: AOUpUlEY49S5wqrrqjVZjkyvCjbZFKYa+dN6W6Jy1pdFOA1C3PobMIsf s4x9KI0fkuXjCORbsDi+2QOv/eTVU+BVmgvdaP2pJg==
X-Google-Smtp-Source: AAOMgpc6icko4HZLhuk3jA9Q66dig4AjCZEKXWDmBqyDXubiv1q/OIXrACyZGegHI7oTGhK1Pvp/iY/zx5H19pL4/nc=
X-Received: by 2002:a63:6243:: with SMTP id w64-v6mr9906239pgb.179.1532299991468;  Sun, 22 Jul 2018 15:53:11 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Sun, 22 Jul 2018 15:52:50 -0700 (PDT)
In-Reply-To: <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Sun, 22 Jul 2018 18:52:50 -0400
Message-ID: <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000ae506b05719e64cc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mPUqJ4v03TDnVJWLXF0hjd8FGQs>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Jul 2018 22:53:14 -0000

--000000000000ae506b05719e64cc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, Jul 21, 2018 at 12:49 PM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Dick,
>
> Am 19.07.2018 um 15:46 schrieb Dick Hardt <dick.hardt@gmail.com>:
>
> I think any scenario with multiple resource servers relying on the same A=
S
>> for authorization where the client acts on behalf of the resource owner
>> qualifies for grant type code and distributed OAuth.
>>
>> Let=E2=80=99s assume a user wants to authorize a client for access to he=
r cloud
>> storage, email account and contacts when setting app the respective app.
>>
>
> Would you walk me through the user experience that happened for the clien=
t
> to do discovery on these three resources? In other words, what did the us=
er
> do to get the client to call the resource and get back the 401 response?
>
>
> I would assume the user enters the URLs or identifies the respective
> service providers in the app (e.g. by entering her email address). The
> client then sends an initial request as described in your draft and gets
> back the 401.
>

Entering in an email address that resolves to a resource makes sense. It
would seem that even if this was email, calendar etc. -- that those would
be different scopes for the same AS, not even different resources. That is
how all of Google, Microsoft work today.

It seems improbable that an end user is going to post multiple resource end
points. But I'm interested if you can present such a use case.



>
> Doing so for several resources will give the client the AS URL for all
> involved resources. If the client compares the iss claims it will figure
> our all resources are protected by the same AS and can authorize access v=
ia
> a single authz code grant flow.
>

Today, if you had a Google hosted email and a Microsoft hosted email, you
would have different AS.

Do you have another example?



>
> kind regards,
> Torsten.
>

--000000000000ae506b05719e64cc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_extra"><br><div class=3D"gmail_quo=
te">On Sat, Jul 21, 2018 at 12:49 PM, Torsten Lodderstedt <span dir=3D"ltr"=
>&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@l=
odderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div=
 dir=3D"auto"><div></div><div>Hi Dick,</div><span class=3D""><div><br>Am 19=
.07.2018 um 15:46 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail=
.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br></div><blockqu=
ote type=3D"cite"><div><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto">I t=
hink any scenario with multiple resource servers relying on the same AS for=
 authorization where the client acts on behalf of the resource owner qualif=
ies for grant type code and distributed OAuth.=C2=A0<div><br></div><div>Let=
=E2=80=99s assume a user wants to authorize a client for access to her clou=
d storage, email account and contacts when setting app the respective app.<=
/div></div></blockquote><div><br></div><div>Would you walk me through the u=
ser experience that happened for the client to do discovery on these three =
resources? In other words, what did the user do to get the client to call t=
he resource and get back the 401 response?</div><div></div></div></blockquo=
te><br></span><div>I would assume the user enters the URLs or identifies th=
e respective service providers in the app (e.g. by entering her email addre=
ss). The client then sends an initial request as described in your draft an=
d gets back the 401.</div></div></blockquote><div><br></div><div>Entering i=
n an email address that resolves to a resource makes sense. It would seem t=
hat even if this was email, calendar etc. -- that those would be different =
scopes for the same AS, not even different resources. That is how all of Go=
ogle, Microsoft work today.</div><div><br></div><div>It seems improbable th=
at an end user is going to post multiple resource end points. But I&#39;m i=
nterested if you can present such a use case.</div><div><br></div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><div><br></div><d=
iv>Doing so for several resources will give the client the AS URL for all i=
nvolved resources. If the client compares the iss claims it will figure our=
 all resources are protected by the same AS and can authorize access via a =
single authz code grant flow.</div></div></blockquote><div><br></div><div>T=
oday, if you had a Google hosted email and a Microsoft hosted email, you wo=
uld have different AS.=C2=A0</div><div><br></div><div>Do you have another e=
xample?</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"=
><div dir=3D"auto"><div><br></div><div>kind regards,</div><div>Torsten.</di=
v></div></blockquote></div><br></div></div>

--000000000000ae506b05719e64cc--


From nobody Mon Jul 23 00:42:30 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD284130E1E for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 00:42:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dYmaXjMSgsGl for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 00:42:25 -0700 (PDT)
Received: from smtprelay07.ispgateway.de (smtprelay07.ispgateway.de [134.119.228.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E58F212D949 for <oauth@ietf.org>; Mon, 23 Jul 2018 00:42:24 -0700 (PDT)
Received: from [80.187.100.135] (helo=[10.77.119.75]) by smtprelay07.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fhVU5-0005Cl-K1; Mon, 23 Jul 2018 09:42:22 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-4036E3F1-8D72-4D07-A6A6-0942840AC992; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com>
Date: Mon, 23 Jul 2018 09:42:20 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/8iJWMw1FC2acQvzvadmzjtB8FcQ>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 07:42:28 -0000

--Apple-Mail-4036E3F1-8D72-4D07-A6A6-0942840AC992
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Dick,

> Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> Entering in an email address that resolves to a resource makes sense. It w=
ould seem that even if this was email, calendar etc. -- that those would be d=
ifferent scopes for the same AS, not even different resources. That is how a=
ll of Google, Microsoft work today.

I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction.=20

Can any of the Google or Microsoft on this list representatives please comme=
nt?

In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.

In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).

kind regards,
Torsten.=

--Apple-Mail-4036E3F1-8D72-4D07-A6A6-0942840AC992
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyMzA3NDIyMFowIwYJKoZIhvcNAQkEMRYE
FNrod2EZGeouK6GPuST+7959hLl7MIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQCLdERlzlYwjK4hZP8t0mjB1FS/BMUw
VnnIWSUk2cKgXZih4GgbE+cyFjaZrr7km03rlnVuNPPVd3/6gKrcjsdZ8j1EHN2QS3yskXXVAIG5
MtVPniHgcg3Cn/QN4oSBwr1ZUH0gxjkFTST0s4JEBfXhOV+bc/pTn4170LxOf14pU/swFeBeiw0K
ruMmiH80jiFohblWEvWwoi78ARtrdzPm99SlqHm488n6mLGSDM1XRTeI9RbOsmgkXiLyHrAui/KX
jjCS45iaqdzcotLSmy3Rb6YYWcpzjzfWNhIrqOEIV/BcvsmttygKR3k4FXaQxnx6D9H/MKxcEDrK
7StCmDnNAAAAAAAA
--Apple-Mail-4036E3F1-8D72-4D07-A6A6-0942840AC992--


From nobody Mon Jul 23 04:58:25 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 039D0130DE1 for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 04:58:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uLZh7iiaL_Uj for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 04:58:21 -0700 (PDT)
Received: from mail-pl0-x22e.google.com (mail-pl0-x22e.google.com [IPv6:2607:f8b0:400e:c01::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AE71130DD4 for <oauth@ietf.org>; Mon, 23 Jul 2018 04:58:21 -0700 (PDT)
Received: by mail-pl0-x22e.google.com with SMTP id e11-v6so135342plb.3 for <oauth@ietf.org>; Mon, 23 Jul 2018 04:58:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=vn8PeUnc21l1ZqBp5fMkzzXcHBTmLLnR7fh+NBmR7xc=; b=UN+Nfid/ZSGtIpGIM+WwhpTHqOxjsBiHDIZQTFosdF69y2aNoeNCxnoR9/1cFfUvLA GfvkpRFoCfCJ8vLV3XZP7D8eklA9nUEhQtXBJbrJF6ezajPg+1jP3R4jdVOKRVnQKWTn hqYvDUz1k4afI/XKogQVxQCCkEyc29BCiN3yer+KeRfSBGAZ+ftcrOhKZppeQWvCgsqF pHuxSxQdJBVVLPOC6yAn7ucMGYTyo1/nT2T9T1VHoXKMnOJj0AlsZfWnFOURkILCVMOS 6VDpHgoXVyqnUheEk3JIedlq7O7gJhJXnpgkWwa0bFqryhPdJ8ZwKjuKdkSiXdqjBE+g wMXQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vn8PeUnc21l1ZqBp5fMkzzXcHBTmLLnR7fh+NBmR7xc=; b=kY3JBYxgS/piWQxuzbWU1JRdP9VmAzXoWOnaChPRgpzmjshtz6hz5LcHNK9XMYV2Az UeEgcSQrFLuajOtPh0BuywmGHycwRX6TwYsb3rgYSJB9eueB8cdpajDMZJ63Es+7d1Wn 2cgk2mKSEacQJ+bBigfudgbzqZExGYiZVhLk/snvpMeJQe/NKc4Kzi+vrQyJE9AYPXWQ UqizejPfvCtI3dbeoMEk5nmq86mjIIX/FSm02CiRE5yJCa92x5b5ZM/KknnOP0brjVRd 46Uzh+TuutE9SgpaQ7SOUdbbyCATGpyufN/PzrT87zQmJmCg9YtD1ZNVP2UK+8BhF3Gu 4bgA==
X-Gm-Message-State: AOUpUlFhviPT2BJ4fO2pQsB8E5f+kyg7sC7eFpQd3g2EFOKgYPSAZXd0 bXqB0h70hE3oJ6Rw4QLSPI7DUjqUbOxHeWJwyVZNJA==
X-Google-Smtp-Source: AAOMgpeLrVBQQnYTWMzsYNETZwh6OXWx8yA2vYhTsXY1+ZEVav8PEai5vr8ua8fmDyBKlbsOtGw46DD4Zbt7vX7K0MU=
X-Received: by 2002:a17:902:b20d:: with SMTP id t13-v6mr12761863plr.121.1532347100703;  Mon, 23 Jul 2018 04:58:20 -0700 (PDT)
MIME-Version: 1.0
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net>
In-Reply-To: <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 23 Jul 2018 07:58:09 -0400
Message-ID: <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="0000000000009c309c0571a95c50"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_xbfiEXN1pJBEjDePWRrak83DJQ>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 11:58:23 -0000

--0000000000009c309c0571a95c50
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

In your examples, are these the same AS?



On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@lodderstedt.ne=
t>
wrote:

> Hi Dick,
>
> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
> >
> > Entering in an email address that resolves to a resource makes sense. I=
t
> would seem that even if this was email, calendar etc. -- that those would
> be different scopes for the same AS, not even different resources. That i=
s
> how all of Google, Microsoft work today.
>
> I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not
> obvious why one should make all those services a single OAuth resource. I
> assume the fact OAuth as it is specified today has no concept of
> identifying a resource and audience restrict an access token led to desig=
ns
> not utilizing audience restriction.
>
> Can any of the Google or Microsoft on this list representatives please
> comment?
>
> In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud=
 and
> further services were treated as different resources and clients needed
> different (audience restricted) access tokens to use it.
>
> In case of YES, the locations of a user=E2=80=99s services for account
> information, payment initiation, identity, and electronic signature are
> determined based on her bank affiliation (bank identification code). In
> general, each of these services may be provided/operated by a different
> entity and exposed at completely different endpoints (even different DNS
> domains).
>
> kind regards,
> Torsten.

--0000000000009c309c0571a95c50
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div><div dir=3D"auto">In your examples, are these the same AS?</div></div>=
<div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten L=
odderstedt &lt;<a href=3D"mailto:torsten@lodderstedt.net">torsten@lodderste=
dt.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.h=
ardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. =
It would seem that even if this was email, calendar etc. -- that those woul=
d be different scopes for the same AS, not even different resources. That i=
s how all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not obvious why one should make all those services a single OAut=
h resource. I assume the fact OAuth as it is specified today has no concept=
 of identifying a resource and audience restrict an access token led to des=
igns not utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comm=
ent?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud a=
nd further services were treated as different resources and clients needed =
different (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account info=
rmation, payment initiation, identity, and electronic signature are determi=
ned based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and ex=
posed at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>

--0000000000009c309c0571a95c50--


From nobody Mon Jul 23 06:21:05 2018
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 83642130DD0; Mon, 23 Jul 2018 06:20:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.82.0
Auto-Submitted: auto-generated
Precedence: bulk
CC: ekr@rtfm.com, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, draft-ietf-oauth-token-exchange@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org, Hannes Tschofenig <Hannes.Tschofenig@gmx.net>, oauth-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender: <iesg-secretary@ietf.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Reply-To: ietf@ietf.org
Message-ID: <153235205852.20315.16316852302695725778.idtracker@ietfa.amsl.com>
Date: Mon, 23 Jul 2018 06:20:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/KYCRBcdl6-U5K2mxj395FMi3U4o>
Subject: [OAUTH-WG] Last Call: <draft-ietf-oauth-token-exchange-14.txt> (OAuth 2.0 Token Exchange) to Proposed Standard
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 13:20:59 -0000

The IESG has received a request from the Web Authorization Protocol WG
(oauth) to consider the following document: - 'OAuth 2.0 Token Exchange'
  <draft-ietf-oauth-token-exchange-14.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-08-06. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This specification defines a protocol for an HTTP- and JSON- based
   Security Token Service (STS) by defining how to request and obtain
   security tokens from OAuth 2.0 authorization servers, including
   security tokens employing impersonation and delegation.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-oauth-token-exchange/ballot/


No IPR declarations have been submitted directly on this I-D.





From nobody Mon Jul 23 09:50:31 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E66B130EF4 for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 09:50:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.31
X-Spam-Level: 
X-Spam-Status: No, score=0.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_BL=0.01, RCVD_IN_MSPIKE_L3=2.899, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P-eMZ-WnuMzD for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 09:50:27 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E2E0130F1E for <oauth@ietf.org>; Mon, 23 Jul 2018 09:50:26 -0700 (PDT)
Received: from [80.187.108.225] (helo=[10.50.112.124]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fhe2S-0001qi-CH; Mon, 23 Jul 2018 18:50:24 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-A20BBBF5-5946-4359-B6BC-8C0C275AED25; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com>
Date: Mon, 23 Jul 2018 18:50:23 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/VFRo-Q0E-GylQLjknBBSmmZmRBI>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 16:50:30 -0000

--Apple-Mail-A20BBBF5-5946-4359-B6BC-8C0C275AED25
Content-Type: multipart/alternative;
	boundary=Apple-Mail-52370B4F-10B7-4161-9A5D-2FE8C7BB1C9C
Content-Transfer-Encoding: 7bit


--Apple-Mail-52370B4F-10B7-4161-9A5D-2FE8C7BB1C9C
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> In your examples, are these the same AS?

yes

>=20
>=20
>=20
>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@lodderstedt.=
net> wrote:
>> Hi Dick,
>>=20
>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>> >=20
>> > Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.
>>=20
>> I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not obvious why one should make all those services a single OAuth=
 resource. I assume the fact OAuth as it is specified today has no concept o=
f identifying a resource and audience restrict an access token led to design=
s not utilizing audience restriction.=20
>>=20
>> Can any of the Google or Microsoft on this list representatives please co=
mment?
>>=20
>> In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud=
 and further services were treated as different resources and clients needed=
 different (audience restricted) access tokens to use it.
>>=20
>> In case of YES, the locations of a user=E2=80=99s services for account in=
formation, payment initiation, identity, and electronic signature are determ=
ined based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and exp=
osed at completely different endpoints (even different DNS domains).
>>=20
>> kind regards,
>> Torsten.

--Apple-Mail-52370B4F-10B7-4161-9A5D-2FE8C7BB1C9C
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div><br></div><div>Am 23.07.201=
8 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail.com">di=
ck.hardt@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div=
><div dir=3D"auto">In your examples, are these the same AS?</div></div></div=
></blockquote><div><br></div><div>yes</div><br><blockquote type=3D"cite"><di=
v><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div><br><div clas=
s=3D"gmail_quote"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten L=
odderstedt &lt;<a href=3D"mailto:torsten@lodderstedt.net">torsten@loddersted=
t.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comme=
nt?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></body></html>=

--Apple-Mail-52370B4F-10B7-4161-9A5D-2FE8C7BB1C9C--

--Apple-Mail-A20BBBF5-5946-4359-B6BC-8C0C275AED25
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-A20BBBF5-5946-4359-B6BC-8C0C275AED25--


From nobody Mon Jul 23 10:27:06 2018
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1C3E130E66 for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 10:27:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wh-WRqvFhND6 for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 10:27:01 -0700 (PDT)
Received: from mail-io0-x231.google.com (mail-io0-x231.google.com [IPv6:2607:f8b0:4001:c06::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D719130E20 for <oauth@ietf.org>; Mon, 23 Jul 2018 10:27:01 -0700 (PDT)
Received: by mail-io0-x231.google.com with SMTP id g11-v6so1191845ioq.9 for <oauth@ietf.org>; Mon, 23 Jul 2018 10:27:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=o+A6ysfOT/7ri8Vie0L2AR/Naj+IK/XbcG8mjBTw9ck=; b=ePua8AdIaf6msrQml41UhnxZSQxCx8E1sRX7wn8NeopVQDK29prV+1ocsTvDda4PZp fZfrDB8uptqm3ATAHAUSaXSITCaQifxrrOOrDnO0zJttd0q7m+juugxnlDfr0dEdNXc8 RhdsdC/r1zZjliq9U2I+6mcuHnXNRe6gnHoro=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=o+A6ysfOT/7ri8Vie0L2AR/Naj+IK/XbcG8mjBTw9ck=; b=bx9k1o1wZtdJZzMiHigIib5Q4tpt376AaC9lROtYrQVwlhxoVrbi6ZFtNI3TPDnG/d tUKwDbKfz3W+msJortgUyNjxy4Y491jA2DN26dHqElyPNv+QcTjOAC9mZuKW9Zg0r+01 f2X649Ws7RFcRMN7HLWjlMPKdu84DKxbt5b7n9au1B6z26vDDVcgTVqtDSTVwzD6shLw 1/e6KQ/nCJKZaq8SagWLk6B6uIqdbasJvtfsPtzDRFyFRcU7jvxIsnfnbJ0y1Ps+TvaW QVKD/sbvMBsKB8eN0eAL3xlbna5MpqLMr/+kL/8CNhpdB/4KKMZJaQtVNhLBw9DZnJtY 3yMg==
X-Gm-Message-State: AOUpUlHfI6QEXft3ry3Qi5AswTFHEFygzWWFWHxYDbyM+59NbVx9hKz+ MPeqaYD8m5MuKnFDeEosfbL3ej7+HpSpT8T+sDxGsvQigYsJvCZM5d5tJwReXwMY+G9h5AKJ6z9 EYZzkVKUiuG3Chg==
X-Google-Smtp-Source: AAOMgpd7s0QGyYI9ESTDyNtSLikhk5DEFqadpf4eZYqQBvlNwfc9FdXF32kLq2D25kOrk/xQQZzJdczIJDd1VLTz9VE=
X-Received: by 2002:a6b:294b:: with SMTP id p72-v6mr10221228iop.17.1532366820491;  Mon, 23 Jul 2018 10:27:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a02:6d18:0:0:0:0:0 with HTTP; Mon, 23 Jul 2018 10:26:29 -0700 (PDT)
In-Reply-To: <62C4BE6B-5E04-4E93-8083-A6D0895F2740@lodderstedt.net>
References: <CAGL6ep+p-JsvuT5imuNN=NXg2rGX98omibO7KeGxAu3yGpaiWg@mail.gmail.com> <CA+k3eCRy_1_pgB=KWJMOgUAEgwX_jrSkpBrffk__khV_Jv1nDA@mail.gmail.com> <TY2PR01MB22971D8FB9BCA1513C3794E9F9510@TY2PR01MB2297.jpnprd01.prod.outlook.com> <426DBA0B-CC9B-4D9D-9ED8-5AD779159638@lodderstedt.net> <CALAqi_-hciPUdQbq7kmu-mJMECjVzj_Xp_vDsdYi_yCDCG8=wg@mail.gmail.com> <CA+k3eCQx3puZsgyBGf=GAeAcYmrJMTgkU90WUu3W-VNU6-KurQ@mail.gmail.com> <62C4BE6B-5E04-4E93-8083-A6D0895F2740@lodderstedt.net>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 23 Jul 2018 11:26:29 -0600
Message-ID: <CA+k3eCRR3jOvq+odtEtFQOu7pNXKFpfDnTHs8w1KeWGZ7U_CBw@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: Filip Skokan <panva.ip@gmail.com>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000005d080571adf413"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/jHMeo71NIEJvyUucDJANV1wn_ic>
Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 17:27:05 -0000

--000000000000005d080571adf413
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

My sense is that there's enough WG support to keep the multiple "resource"
parameters at both endpoints. The contextual meaning might be a bit
different at each endpoint - as you point out the refresh token may
represent the overall grant whereas the token request may issue an access
token representing the whole or a subset of the overall grant. There's also
the implicit grant to consider where the access token is returned from the
authorization endpoint.

The draft hasn't seen any real changes since the initial -00 individual
posting a couple years ago.  So, with its impeding adoption, it's overdue
for some updates - especially some more text and/or clarifications on
what's being discussed in this thread. I'm always happy to consider
proposed text from you, Torsten, for any of this stuff.



On Sat, Jul 21, 2018 at 10:34 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> Hi Brian,
>
> Am 20.07.2018 um 16:18 schrieb Brian Campbell <bcampbell@pingidentity.com
> >:
>
> The current draft does allow multiple "resource" parameters. However,
> there seemed to be consensus in the WG meeting yesterday that only a sing=
le
> "resource" parameter was preferable
>
>
> I think this makes sense for the token request. This allows the AS to
> audience restrict and token bind the access token to a single resource
> server URL.
>
> and that a client could obtain an access token per resource (likely using
> a refresh token).
>
>
> I think the refresh token may represent the overall grant whereas the
> token request may issue an access token representing the whole or a subse=
t
> of the overall grant.
>
> The question is what this means with respect to the scope. I assume scope
> values are typically bound to a certain resource service. For example,
> =E2=80=9Copenid email mediacloud#read emailservice#read=E2=80=9D would ma=
tch to permission
> on a OpenID OP, a private cloud and an email service. I therefore would
> suggest the AS may filter the scope down to the values applicable to the
> resource server for which the access token is being minted.
>
> Another question relates to the applicable resource URIs. Do you envision
> any way to constraint the resource URIs for which an access token might b=
e
> created for a particular grant? My feeling is the resource owner should
> have a chance to consent or not in order to prevent the client to access
> resource servers the resource owner does not want it to do so.
>
> I'm personally sympathetic to that point. But maybe it's too restrictive.
> I would like to see some more text about the complexity implications of
> multiple "resource" parameters and perhaps some discouragement of doing s=
o.
>
>
> As stated above, I=E2=80=99m fine with a single parameter. I could provid=
e some
> text on how the resource parameter could govern the AS behavior in case o=
f
> code and refresh token grant.
>
> I believe logical names are more potentially useful in an STS framework
> like token exchange but should be out of scope for this work.
>
>
> Are you referring to logical resource names?
>
> kind regards,
> Torsten.
>
>
>
>
>
>
>
>
>
> On Fri, Jul 20, 2018 at 3:43 AM, Filip Skokan <panva.ip@gmail.com> wrote:
>
>> Hi Torsten,
>>
>> > Multiple "resource" parameters may be used to indicate that the issued
>> token is intended to be used at multiple resource servers.
>>
>> That's already in. Furthermore what about logical names for target
>> services? Like was added in -03 of token exchange?
>>
>> Best,
>> *Filip Skokan*
>>
>>
>> On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt <
>> torsten@lodderstedt.net> wrote:
>>
>>> I support adoption of this document.
>>>
>>> I would like to point out (again) a single resource is not sufficient
>>> for most use cases I implemented in the last couple if years. I=E2=80=
=98m
>>> advocating for enhancing the draft to support multiple resources and a
>>> clear definition of the relationship between resource(s) and scope.
>>>
>>> Am 20.07.2018 um 08:20 schrieb n-sakimura <n-sakimura@nri.co.jp>:
>>>
>>> +1
>>>
>>>
>>>
>>> *From:* OAuth [mailto:oauth-bounces@ietf.org <oauth-bounces@ietf.org>] =
*On
>>> Behalf Of *Brian Campbell
>>> *Sent:* Friday, July 20, 2018 7:42 AM
>>> *To:* Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
>>> *Cc:* oauth <oauth@ietf.org>
>>> *Subject:* Re: [OAUTH-WG] Call for adoption for "Resource Indicators
>>> for OAuth 2.0"
>>>
>>>
>>>
>>> I support adoption of this document.
>>>
>>>
>>>
>>> On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef <
>>> rifaat.ietf@gmail.com> wrote:
>>>
>>> Hi all,
>>>
>>> This is the call for adoption of the 'Resource Indicators for OAuth 2.0=
'
>>> document
>>> following the positive call for adoption at the Montreal IETF meeting.
>>>
>>> Here is the document:
>>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>>
>>> Please let us know by August 2nd whether you accept / object to the
>>> adoption of this document as a starting point for work in the OAuth
>>> working group.
>>>
>>> Regards,
>>> Rifaat
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>>> privileged material for the sole use of the intended recipient(s). Any
>>> review, use, distribution or disclosure by others is strictly prohibite=
d..
>>> If you have received this communication in error, please notify the sen=
der
>>> immediately by e-mail and delete the message and any file attachments f=
rom
>>> your computer. Thank you.*
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.
> If you have received this communication in error, please notify the sende=
r
> immediately by e-mail and delete the message and any file attachments fro=
m
> your computer. Thank you.*
>
>

--=20
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged=
=20
material for the sole use of the intended recipient(s). Any review, use,=20
distribution or disclosure by others is strictly prohibited.=C2=A0 If you h=
ave=20
received this communication in error, please notify the sender immediately=
=20
by e-mail and delete the message and any file attachments from your=20
computer. Thank you._

--000000000000005d080571adf413
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>My sense is that there&#39;s enough WG support to kee=
p the <span class=3D"gmail-m_-9023010299598301634gmail-im">multiple &quot;r=
esource&quot; parameters</span> at both endpoints. The contextual meaning m=
ight be a bit different at each endpoint - as you point out the refresh tok=
en may represent the overall grant whereas the token=20
request may issue an access token representing the whole or a subset of=20
the overall grant. There&#39;s also the implicit grant to consider where th=
e access token is returned from the authorization endpoint. <br></div><div>=
<br></div><div>The draft hasn&#39;t seen any real changes since the initial=
 -00 individual posting a couple years ago.=C2=A0 So, with its impeding ado=
ption, it&#39;s overdue for some updates - especially some more text and/or=
 clarifications on what&#39;s being discussed in this thread. I&#39;m alway=
s happy to consider proposed text from you, Torsten, for any of this stuff.=
=C2=A0 <br></div><div><br></div><div><br></div></div><div class=3D"gmail_ex=
tra"><br><div class=3D"gmail_quote">On Sat, Jul 21, 2018 at 10:34 AM, Torst=
en Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.=
net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div dir=3D"auto"><div><span></span></div><div>=
<div></div><div>Hi Brian,</div><span class=3D""><div><br>Am 20.07.2018 um 1=
6:18 schrieb Brian Campbell &lt;<a href=3D"mailto:bcampbell@pingidentity.co=
m" target=3D"_blank">bcampbell@pingidentity.com</a>&gt;:<br><br></div><bloc=
kquote type=3D"cite"><div><div dir=3D"ltr"><div>The current draft does allo=
w multiple &quot;resource&quot; parameters. However, there seemed to be con=
sensus in the WG meeting yesterday that only a single &quot;resource&quot; =
parameter was preferable </div></div></div></blockquote><div><br></div></sp=
an><div>I think this makes sense for the token request. This allows the AS =
to audience restrict and token bind the access token to a single resource s=
erver URL.</div><span class=3D""><br><blockquote type=3D"cite"><div><div di=
r=3D"ltr"><div>and that a client could obtain an access token per resource =
(likely using a refresh token). </div></div></div></blockquote><div><br></d=
iv></span><div>I think the refresh token may represent the overall grant wh=
ereas the token request may issue an access token representing the whole or=
 a subset of the overall grant.</div><div><br></div><div>The question is wh=
at this means with respect to the scope. I assume scope values are typicall=
y bound to a certain resource service. For example, =E2=80=9Copenid email m=
ediacloud#read emailservice#read=E2=80=9D would match to permission on a Op=
enID OP, a private cloud and an email service. I therefore would suggest th=
e AS may filter the scope down to the values applicable to the resource ser=
ver for which the access token is being minted.</div><div><br></div><div>An=
other question relates to the applicable resource URIs. Do you envision any=
 way to constraint the resource URIs for which an access token might be cre=
ated for a particular grant? My feeling is the resource owner should have a=
 chance to consent or not in order to prevent the client to access resource=
 servers the resource owner does not want it to do so.</div><span class=3D"=
"><div><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr"><div>I&#39=
;m personally sympathetic to that point. But maybe it&#39;s too restrictive=
. I would like to see some more text about the complexity implications of m=
ultiple &quot;resource&quot; parameters and perhaps some discouragement of =
doing so. </div></div></div></blockquote><div><br></div></span><div>As stat=
ed above, I=E2=80=99m fine with a single parameter. I could provide some te=
xt on how the resource parameter could govern the AS behavior in case of co=
de and refresh token grant.</div><span class=3D""><br><blockquote type=3D"c=
ite"><div><div dir=3D"ltr"><div>I believe logical names are more potentiall=
y useful in an STS framework like token=C2=A0exchange but should be out of =
scope for this work. </div></div></div></blockquote><div><br></div></span>A=
re you referring to logical resource names?<div><br></div><div>kind regards=
,</div><div>Torsten.</div><div><br><blockquote type=3D"cite"><div><div><div=
 class=3D"h5"><div dir=3D"ltr"><div>=C2=A0 <br></div><div><br></div><div><b=
r></div><div><br></div><div><br></div><div><br></div><div><br></div></div><=
div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Fri, Jul 20, 20=
18 at 3:43 AM, Filip Skokan <span dir=3D"ltr">&lt;<a href=3D"mailto:panva.i=
p@gmail.com" target=3D"_blank">panva.ip@gmail.com</a>&gt;</span> wrote:<br>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div>Hi Torsten,</div><div>=
<br></div><div>&gt;=C2=A0Multiple &quot;resource&quot; parameters may be us=
ed to indicate that the issued token is intended to be used at multiple res=
ource servers.</div><div><br></div><div>That&#39;s already in. Furthermore =
what about logical names for target services? Like was added in -03 of toke=
n exchange?</div><br clear=3D"all"><div><div dir=3D"ltr" class=3D"m_2966597=
302912809778m_477017653891901618gmail_signature">Best,<br><b>Filip Skokan</=
b></div></div><br></div><div class=3D"m_2966597302912809778HOEnZb"><div cla=
ss=3D"m_2966597302912809778h5"><br><div class=3D"gmail_quote"><div dir=3D"l=
tr">On Fri, Jul 20, 2018 at 9:33 AM Torsten Lodderstedt &lt;<a href=3D"mail=
to:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&g=
t; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><div></=
div><div>I support adoption of this document.</div><div><br></div><div>I wo=
uld like to point out (again) a single resource is not sufficient for most =
use cases I implemented in the last couple if years. I=E2=80=98m advocating=
 for enhancing the draft to support multiple resources and a clear definiti=
on of the relationship between resource(s) and scope.</div><div><br>Am 20.0=
7.2018 um 08:20 schrieb n-sakimura &lt;<a href=3D"mailto:n-sakimura@nri.co.=
jp" target=3D"_blank">n-sakimura@nri.co.jp</a>&gt;:<br><br></div><blockquot=
e type=3D"cite"><div>






<div class=3D"m_2966597302912809778m_477017653891901618m_196579353090663755=
7WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif">+1 <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Arial&quot;,sans-se=
rif"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><b>From:</b> OAuth [<a href=3D"mailto:oauth-bounces@=
ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a><wbr>] <b>On B=
ehalf Of
</b>Brian Campbell<br>
<b>Sent:</b> Friday, July 20, 2018 7:42 AM<br>
<b>To:</b> Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Cc:</b> oauth &lt;<a href=3D"mailto:oauth@ietf.org" target=3D"_blank">oa=
uth@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [OAUTH-WG] Call for adoption for &quot;Resource Indicat=
ors for OAuth 2.0&quot;<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">I support adoption of this document. <u></u><u></u><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jul 19, 2018 at 4:01 PM, Rifaat Shekh-Yusef =
&lt;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@=
gmail.com</a>&gt; wrote:<u></u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">Hi all,<br>
<br>
This is the call for adoption of the &#39;Resource Indicators for OAuth 2.0=
&#39; document<br>
following the positive call for adoption at the Montreal IETF meeting.<br>
<br>
Here is the document:<br>
</span><a href=3D"https://tools.ietf.org/html/draft-campbell-oauth-resource=
-indicators-02" target=3D"_blank"><span style=3D"font-size:12.0pt;color:#11=
55cc">https://tools.ietf.org/html/dr<wbr>aft-campbell-oauth-resource-in<wbr=
>dicators-02</span></a><span style=3D"font-size:12.0pt"><br>
<br>
Please let us know by August 2nd whether you accept / object to the<br>
adoption of this document as a starting point for work in the OAuth<br>
working group.<br>
<br>
Regards,<br>
Rifaat</span> <u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><u></u><u></u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal"><br>
<b><i><span style=3D"font-size:10.0pt;font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#555555;border:none windowtext 1.0pt;padding:0cm">CONFIDENTIAL=
ITY NOTICE: This email may contain confidential and privileged material for=
 the sole use of the intended recipient(s).
 Any review, use, distribution or disclosure by others is strictly prohibit=
ed..=C2=A0 If you have received this communication in error, please notify =
the sender immediately by e-mail and delete the message and any file attach=
ments from your computer. Thank you.</span></i></b><u></u><u></u></p>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
___________<wbr>_________________</span><br><span>OAuth mailing list</span>=
<br><span><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.or=
g</a></span><br><span><a href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h" target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a></=
span><br></div></blockquote></div>______________________________<wbr>______=
___________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
</blockquote></div>
</div></div><br>______________________________<wbr>_________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/oauth</a><br>
<br></blockquote></div><br></div>

<br>
</div></div><i style=3D"margin:0px;padding:0px;border:0px;outline:0px;verti=
cal-align:baseline;background:rgb(255,255,255);font-family:proxima-nova-zen=
desk,system-ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-S=
ans,Ubuntu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(=
85,85,85)"><span style=3D"margin:0px;padding:0px;border:0px;outline:0px;ver=
tical-align:baseline;background:transparent;font-family:proxima-nova-zendes=
k,system-ui,-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Ox=
ygen-Sans,Ubuntu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font=
-weight:600"><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contai=
n confidential and privileged material for the sole use of the intended rec=
ipient(s). Any review, use, distribution or disclosure by others is strictl=
y prohibited.=C2=A0 If you have received this communication in error, pleas=
e notify the sender immediately by e-mail and delete the message and any fi=
le attachments from your computer. Thank you.</font></span></i></div></bloc=
kquote></div></div></div></blockquote></div><br></div>

<br>
<i style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:ba=
seline;background:rgb(255,255,255);font-family:proxima-nova-zendesk,system-=
ui,-apple-system,system-ui,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ubuntu,C=
antarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;color:rgb(85,85,85)"><=
span style=3D"margin:0px;padding:0px;border:0px;outline:0px;vertical-align:=
baseline;background:transparent;font-family:proxima-nova-zendesk,system-ui,=
-apple-system,BlinkMacSystemFont,&quot;Segoe UI&quot;,Roboto,Oxygen-Sans,Ub=
untu,Cantarell,&quot;Helvetica Neue&quot;,Arial,sans-serif;font-weight:600"=
><font size=3D"2">CONFIDENTIALITY NOTICE: This email may contain confidenti=
al and privileged material for the sole use of the intended recipient(s). A=
ny review, use, distribution or disclosure by others is strictly prohibited=
.=C2=A0 If you have received this communication in error, please notify the=
 sender immediately by e-mail and delete the message and any file attachmen=
ts from your computer. Thank you.</font></span></i>
--000000000000005d080571adf413--


From nobody Mon Jul 23 16:25:35 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A2CD130E04 for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 16:25:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WFSiIB4f0T1c for <oauth@ietfa.amsl.com>; Mon, 23 Jul 2018 16:25:31 -0700 (PDT)
Received: from mail-pl0-x229.google.com (mail-pl0-x229.google.com [IPv6:2607:f8b0:400e:c01::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CD15130DF1 for <oauth@ietf.org>; Mon, 23 Jul 2018 16:25:31 -0700 (PDT)
Received: by mail-pl0-x229.google.com with SMTP id o7-v6so861829plk.10 for <oauth@ietf.org>; Mon, 23 Jul 2018 16:25:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=7QM/AkoCuFMHzD2BNbxOCzzAGFriehj9yxt+2ds0OIw=; b=XvRSkIr/2s0eVwqvJvR2CW/yXCF48+IpQG2GuymbZsaPasrdu6MjywLbTHssE2sB/c 8m4ch5XG2LeAvHdRZ2qwv3aEUGzsT9BbJk/3V6n/GXPiAcVGGKcrtT2vcXNqIWEVcaZj PD9dMQFFEOXvHm9Eq/YylRUJd30PPhDg8ULMzAQZ4hEsfsxINIdKApnWqXxol3NChqJa lIdo+XNaRSmEfRcdCoOfeLYmdtO6e5GKvckLy04PTSrBi/0YwhqfUgQXQggLb1YF8CDw HkXrRXGV1L1gpCcsozQ2fDpl749o26+Tqlrddal0a6xkgaD8NJQs1TCACHnefpScO+Em g1AQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=7QM/AkoCuFMHzD2BNbxOCzzAGFriehj9yxt+2ds0OIw=; b=WkKrI9nP1UAzTT7ci/xoy0Fmr1T1J0l8SOdhPUM4bnGGK9g5PV5whWqwJ/5l3GKM/+ 7VAC72utR0g2gfDaPdU5HANBrgOpDwK+SoSLYWnAPMBKtVmqnKJJAPGOM0eZ8UHhvpNp w537NKVZQEbEDRGF9ogNWKNQqajB3IKQwFja65MnWfywmQUOmQdIsmN90fDXPTVnvd9d tQqvE4/onHYtaVNBC8cbUQUCWXd0hgDZcuKQ42gpCIDgX0mAbXofr7Eth0lK1wcVXBlM cTXa08QAOaIRhlk9EfVpRfSxrYoV/bBlR1Npd/pZLhG3+7cHuopuReJYjyaZCh9AVzvs TAPg==
X-Gm-Message-State: AOUpUlFBETsAr0/a93xQVSaCzVJUpi+N0M0qO9TQI5mvWISOT3LX7+5c SUV82LIkoiQL30mZB0AZ+8bisDiFL0QZM/tbopHDRg==
X-Google-Smtp-Source: AAOMgpe0WFu5HeSmdrwYPhx+PjwDIas8ClxTgxNzm9qmbXEye+H/kZWczKCqKg7xUNszbkSgE9LqTMSBhIOTR8ytG7o=
X-Received: by 2002:a17:902:b20d:: with SMTP id t13-v6mr14811969plr.121.1532388330902;  Mon, 23 Jul 2018 16:25:30 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:150c:0:0:0:0 with HTTP; Mon, 23 Jul 2018 16:25:09 -0700 (PDT)
In-Reply-To: <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 23 Jul 2018 19:25:09 -0400
Message-ID: <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="0000000000001f1c7f0571b2f68a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mw2R_FAXZde0EqMfWTaYuGsKjsk>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 23:25:34 -0000

--0000000000001f1c7f0571b2f68a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

And who is the AS?

On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

>
> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>
> In your examples, are these the same AS?
>
>
> yes
>
>
>
>
> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
>> Hi Dick,
>>
>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>> >
>> > Entering in an email address that resolves to a resource makes sense.
>> It would seem that even if this was email, calendar etc. -- that those
>> would be different scopes for the same AS, not even different resources.
>> That is how all of Google, Microsoft work today.
>>
>> I don=E2=80=99t know how those services work re OAuth resources. To me i=
t=E2=80=99s not
>> obvious why one should make all those services a single OAuth resource. =
I
>> assume the fact OAuth as it is specified today has no concept of
>> identifying a resource and audience restrict an access token led to desi=
gns
>> not utilizing audience restriction.
>>
>> Can any of the Google or Microsoft on this list representatives please
>> comment?
>>
>> In deployments I=E2=80=98m familiar with email, calendar, contacts, clou=
d and
>> further services were treated as different resources and clients needed
>> different (audience restricted) access tokens to use it.
>>
>> In case of YES, the locations of a user=E2=80=99s services for account
>> information, payment initiation, identity, and electronic signature are
>> determined based on her bank affiliation (bank identification code). In
>> general, each of these services may be provided/operated by a different
>> entity and exposed at completely different endpoints (even different DNS
>> domains).
>>
>> kind regards,
>> Torsten.
>
>

--0000000000001f1c7f0571b2f68a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">And who is the AS?</div><div class=3D"gmail_extra"><br><di=
v class=3D"gmail_quote">On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderste=
dt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=
=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex"><div dir=3D"auto"><span class=3D""><div></div><div><br></d=
iv><div>Am 23.07.2018 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:dic=
k.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br><=
/div><blockquote type=3D"cite"><div><div><div dir=3D"auto">In your examples=
, are these the same AS?</div></div></div></blockquote><div><br></div></spa=
n><div>yes</div><span class=3D""><br><blockquote type=3D"cite"><div><div di=
r=3D"auto"><br></div><div dir=3D"auto"><br></div><div><br><div class=3D"gma=
il_quote"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderst=
edt &lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torste=
n@lodderstedt.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi=
 Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.h=
ardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. =
It would seem that even if this was email, calendar etc. -- that those woul=
d be different scopes for the same AS, not even different resources. That i=
s how all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not obvious why one should make all those services a single OAut=
h resource. I assume the fact OAuth as it is specified today has no concept=
 of identifying a resource and audience restrict an access token led to des=
igns not utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comm=
ent?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud a=
nd further services were treated as different resources and clients needed =
different (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account info=
rmation, payment initiation, identity, and electronic signature are determi=
ned based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and ex=
posed at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>

--0000000000001f1c7f0571b2f68a--


From nobody Tue Jul 24 06:31:59 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 94672131110; Tue, 24 Jul 2018 06:31:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benjamin Kaduk <kaduk@mit.edu>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-oauth-device-flow@ietf.org, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth-chairs@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.82.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153243911759.22454.13623930642678414831.idtracker@ietfa.amsl.com>
Date: Tue, 24 Jul 2018 06:31:57 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/OxC_D7dt__5MlrRwT3TowA2jjX8>
Subject: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-device-flow-11: (with DISCUSS and COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 13:31:58 -0000

Benjamin Kaduk has entered the following ballot position for
draft-ietf-oauth-device-flow-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Let me preface this by noting that I'm not sure that all of these points
are actionable; I would, however, like to discuss them.

I'm really unhappy to not see any hard numbers on the entropy needed
in a user code to provide a reasonable security margin with given
parameters, and how it compares to the guessability bounds considered best
practices in general (across protocols).  For example, we think 128-bit
symmetric keys are okay because an attacker has to put in 2**96 work to
have a 2**-32 chance of guessing correctly via brute force; the rate
limiting and finite lifetime on the user code places an artificial limit on
the amount of work an attacker can "do", so if one uses a 8-character
base-20 user code (with roughly 34.5 bits of entropy), the rate-limiting
interval and validity period would need to only allow 5 attempts in order
to get the same 2**-32 probability of success by random guessing.
Section 5.1 would be a great place for such text, near the preexisting:
   The user code SHOULD have enough entropy that when combined with rate
   limiting and other mitigations makes a brute-force attack infeasible.

We talk about "the authorization server", but any given *user* may have a
relationship with multiple such ASes.  Can the Introduction make it more
clear that the AS is associated with the device/client, and as such the
it may not be the user's most-trusted AS?

It also seems like a large latent risk with this flow is when the
verification_uri_complete response is used along with an AS that assumes an
authenticated user making such a verification request has approved the
authorization (i.e., without an explicit user interaction to confirm), when
that AS uses cookies or other persistent state to keep the user
authenticated across multiple requests.  I could not find any MUST-level
requirement for user interaction to confirm the device being authorized
(even in Section 3.3, which covers the regular verificat_uri workflow!);
please let me know if I missed something.  I would like to see some
explicit text that (matching the flow described in Section 3.1 that
requires the user to input the code) explicit user approval of the
authorization is required.  (I do note that Section 5.3 has text about
"SHOULD display information about the device.)

I'm also unhappy about the text in Section 1 that merely requires of the
device the ability to "make outbound HTTPS requests", which leaves room for
an awful lot of sins in certificate validation (and, potentially,
ciphersuite selection).  Can we get a MUST-level requirement for
authenticating the server and a cite to RFC 7525?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Please use the RFC 8174 boilerplate instead of the RFC 2119 one.

Section 3.2

The example expires in 30 minutes?  That seems longer than needed; wouldn't
5 minutes do?

Section 3.3

I agree with directorate reviewer that the MUST NOT requirement for
displaying the device_code should justify that requirement by discussing
the consequences of exposure.

Section 3.5

   authorization_pending
      The authorization request is still pending as the end-user hasn't
      yet completed the user interaction steps (Section 3.3).  The
      client should repeat the Access Token Request to the token
      endpoint.

I feel like we want to mention the 'interval' here or some other discussion
of an inter-request delay.

Also, please clarify "reasonable default polling interval", per multiple
directorate reviews.

Section 5.2

Please clarify the entities involved in "the backchannel flow" that can be
MITM'd.

Section 5.6

The "short-range" part of a "short-range wireless signal" partially depends
on how big the receiver's antenna is.  So perhaps we should be careful
about indicating that this has more security value than it does.

Section 6.1

I'm not sure I understand the usage of "case-insensitive", here -- how
would the user have an expectation of case-insensitivity?  Perhaps it is
better to just say "majuscule" or "upper case" or whatever.



From nobody Tue Jul 24 08:59:39 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 741F0130DF5 for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 08:59:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cr6wrpOhlUZR for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 08:59:35 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA02D130D7A for <oauth@ietf.org>; Tue, 24 Jul 2018 08:59:34 -0700 (PDT)
Received: from [80.187.99.185] (helo=[10.154.68.6]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fhzim-0005eu-68; Tue, 24 Jul 2018 17:59:32 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-0440DDE9-001F-40DF-8355-2ADB7B5D4C2E; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com>
Date: Tue, 24 Jul 2018 17:59:29 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/yPRugflPjIT5WbC4HRtOECwvBKM>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 15:59:39 -0000

--Apple-Mail-0440DDE9-001F-40DF-8355-2ADB7B5D4C2E
Content-Type: multipart/alternative;
	boundary=Apple-Mail-75069959-3917-4D9F-B2EF-AC9F05A2BE6F
Content-Transfer-Encoding: 7bit


--Apple-Mail-75069959-3917-4D9F-B2EF-AC9F05A2BE6F
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> And who is the AS?

In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, it is t=
he central AS/IDP.=20

Why are you asking?

>=20
>> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <torsten@loddersted=
t.net> wrote:
>>=20
>>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>=20
>>> In your examples, are these the same AS?
>>=20
>> yes
>>=20
>>>=20
>>>=20
>>>=20
>>>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@loddersted=
t.net> wrote:
>>>> Hi Dick,
>>>>=20
>>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>> >=20
>>>> > Entering in an email address that resolves to a resource makes sense.=
 It would seem that even if this was email, calendar etc. -- that those woul=
d be different scopes for the same AS, not even different resources. That is=
 how all of Google, Microsoft work today.
>>>>=20
>>>> I don=E2=80=99t know how those services work re OAuth resources. To me i=
t=E2=80=99s not obvious why one should make all those services a single OAut=
h resource. I assume the fact OAuth as it is specified today has no concept o=
f identifying a resource and audience restrict an access token led to design=
s not utilizing audience restriction.=20
>>>>=20
>>>> Can any of the Google or Microsoft on this list representatives please c=
omment?
>>>>=20
>>>> In deployments I=E2=80=98m familiar with email, calendar, contacts, clo=
ud and further services were treated as different resources and clients need=
ed different (audience restricted) access tokens to use it.
>>>>=20
>>>> In case of YES, the locations of a user=E2=80=99s services for account i=
nformation, payment initiation, identity, and electronic signature are deter=
mined based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and exp=
osed at completely different endpoints (even different DNS domains).
>>>>=20
>>>> kind regards,
>>>> Torsten.
>=20

--Apple-Mail-75069959-3917-4D9F-B2EF-AC9F05A2BE6F
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div><br></div><blockquote type=3D=
"cite"><div><div dir=3D"ltr">And who is the AS?</div></div></blockquote><div=
><br></div>In case of yes, it=E2=80=99s typically the bank. At Deutsche Tele=
kom, it is the central AS/IDP.&nbsp;<div><br></div><div>Why are you asking?<=
br><div><div><br><blockquote type=3D"cite"><div><div class=3D"gmail_extra"><=
br><div class=3D"gmail_quote">On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodd=
erstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" tar=
get=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;p=
adding-left:1ex"><div dir=3D"auto"><span class=3D""><div></div><div><br></di=
v><div>Am 23.07.2018 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.=
hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br></di=
v><blockquote type=3D"cite"><div><div><div dir=3D"auto">In your examples, ar=
e these the same AS?</div></div></div></blockquote><div><br></div></span><di=
v>yes</div><span class=3D""><br><blockquote type=3D"cite"><div><div dir=3D"a=
uto"><br></div><div dir=3D"auto"><br></div><div><br><div class=3D"gmail_quot=
e"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt &lt;=
<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodders=
tedt.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"=
margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comme=
nt?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></div></body></html>=

--Apple-Mail-75069959-3917-4D9F-B2EF-AC9F05A2BE6F--

--Apple-Mail-0440DDE9-001F-40DF-8355-2ADB7B5D4C2E
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-0440DDE9-001F-40DF-8355-2ADB7B5D4C2E--


From nobody Tue Jul 24 11:51:10 2018
Return-Path: <ietf@kuehlewind.net>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 945A1130F1C; Tue, 24 Jul 2018 11:50:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: =?utf-8?q?Mirja_K=C3=BChlewind?= <ietf@kuehlewind.net>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-oauth-device-flow@ietf.org, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth-chairs@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.82.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153245825559.22685.11395607099141261021.idtracker@ietfa.amsl.com>
Date: Tue, 24 Jul 2018 11:50:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/3tZOV-s2On2qmV59arjlIHwfPYk>
Subject: [OAUTH-WG] =?utf-8?q?Mirja_K=C3=BChlewind=27s_Discuss_on_draft-i?= =?utf-8?q?etf-oauth-device-flow-11=3A_=28with_DISCUSS=29?=
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 18:50:56 -0000

Mirja KÃ¼hlewind has entered the following ballot position for
draft-ietf-oauth-device-flow-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Please specify more clearly the (default) polling behavior to ensure that the
polling does neither overload the network, nor the server, or is never
terminated. Ideally provide default values and an upper bound for the polling
frequency, as well as a timer to terminate polling if no reply is received (and
no expiration time is given). See further details below.

1) Sec 3.3: "until the user completes the interaction, the code expires, or
another
   error occurs."
What if not expiration time is given (as this optional) and no reply is ever
received?

2) Sec 3.5: "the client should stop polling and react accordingly, for
   example, by displaying an error to the user."
Maybe:
"the client MUST stop polling and SHOULD react accordingly, for
   example, by displaying an error to the user."

3) sec 3.5 "If no interval was provided, the client
   MUST use a reasonable default polling interval."
Can you please provide a default number for a "reasonable" polling interval!
And in best case an upper bound!

4) sec 3.5: "...increasing the time between polls if a
   "slow_down" error is received. "
Maybe use a separate normative sentence instead:
"The client SHOUD increase the time between polls if a
   "slow_down" error is received."
Or MUST? If so how much? Can you given further (default) guidance.

5) sec 3.5: "Clients MAY then choose to
   start a new device authorization session."
Maybe make it clear that polling is stopped
"Clients MUST stop polling but MAY then choose to
   start a new device authorization session."

6) sec 3.5: "then the
   device MAY wait until notified on that channel that the user has
   completed the action before initiating the token request."
Why not SHOULD (or MUST) here?





From nobody Tue Jul 24 13:21:41 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9412130DE4 for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:21:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jloi4XW5KW4v for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:21:38 -0700 (PDT)
Received: from mail-pg1-x536.google.com (mail-pg1-x536.google.com [IPv6:2607:f8b0:4864:20::536]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16EE4130E02 for <oauth@ietf.org>; Tue, 24 Jul 2018 13:21:38 -0700 (PDT)
Received: by mail-pg1-x536.google.com with SMTP id v13-v6so3650569pgr.10 for <oauth@ietf.org>; Tue, 24 Jul 2018 13:21:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FB2yLYLjrjNGqpg8spxK+abZ8/4BZ/qabdQdMNJfMDE=; b=Oukmxw5ie7l4S3fOKZrIYvqlGBOshoV7yRRt6mp2UqEyLr94TTy1emX/IfOIdNIRJ0 RNbvewLdf0gPZq8Bpkb3sMo0EfBq/hR0KyNPDfby55j5sQoTelWnp3w18YaAZq+bwYfr CAJ6pbdDU+iFs6xurdQOaPO/8NPnPDhEamM5ofytiHqBu1zx/iauJjDJhn30aNHNl5lO 9bGPFxZzZJgJMb29c+2OOb0cPoJhMNCjZ6M65dpvdQmTS3faxxeuG67mGufG3HSQqMud PMZ75eZ3Rvz79H5vKF6vO16R6MWjluArl2TUu4jL+DrHQFvErW5ImZv2brrpxW9HpSAG ka7Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FB2yLYLjrjNGqpg8spxK+abZ8/4BZ/qabdQdMNJfMDE=; b=dgow3YZKe5W5/DDK1jH+ntInjOIMiWHR9PYQMrGAkHk912t576A5L6yYnEJO9+lbrr a9Sk7sFqcQzqVHdWz7XyYN9bkod6e5Rlh9SEBh8ItPIU1rHD5Fm5G3eYcD3KPnP/ALUf oDrVIzF7JUtd7/tj0o7nvGY9bnm6WnJZeRTTQLiiy7OAWAdVnVe4fhI1S8HLt3dBzrxC 5l2y/uCmf3N0VmaFeRzZtj3OHCPCpnnhZAf7gqUEEPQDQSUokhSgAqijjyy1ZKxHchEa zNE1VKovJ58onFHUkvirsxhGP/Fl+c/5jEl/imhGNljKZ+2ONtHftp4YMIyzINIkyhPG wIbA==
X-Gm-Message-State: AOUpUlEozH1Ah1GCBsfQGPU8DGtb7WFWXSC1PnerhgLNxivGSzrSDg4y RK78J7fmCsqciXxpjBhKrV0zjJhB/xIC1z0Joea0yvon
X-Google-Smtp-Source: AAOMgpfSPvYsReOJZx7ASmbSrLy+bLNT9pLdQkP1ThP6zsnPlCZxv93WOr/n/AL0JOMtGmD0NJiiWNe3IFnJlb7qZmc=
X-Received: by 2002:aa7:84c2:: with SMTP id x2-v6mr18996808pfn.220.1532463697507;  Tue, 24 Jul 2018 13:21:37 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Tue, 24 Jul 2018 13:21:17 -0700 (PDT)
In-Reply-To: <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com> <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 24 Jul 2018 13:21:17 -0700
Message-ID: <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000523b890571c4823a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/-vzOzmOIdy6WDQY12YFhCq3rqHk>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 20:21:40 -0000

--000000000000523b890571c4823a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I'm trying to understand the use case.

It still is vague. Are you saying that each of these is run by a different
entity, but all trust the bank as the authorization server to manage if the
user has granted permission to use the resource rather than managing it
themselves?

account information, payment initiation, identity, and electronic signature

On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

>
> And who is the AS?
>
>
> In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, it =
is the
> central AS/IDP.
>
> Why are you asking?
>
>
> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
>>
>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>
>> In your examples, are these the same AS?
>>
>>
>> yes
>>
>>
>>
>>
>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <
>> torsten@lodderstedt.net> wrote:
>>
>>> Hi Dick,
>>>
>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>> >
>>> > Entering in an email address that resolves to a resource makes sense.
>>> It would seem that even if this was email, calendar etc. -- that those
>>> would be different scopes for the same AS, not even different resources=
.
>>> That is how all of Google, Microsoft work today.
>>>
>>> I don=E2=80=99t know how those services work re OAuth resources. To me =
it=E2=80=99s not
>>> obvious why one should make all those services a single OAuth resource.=
 I
>>> assume the fact OAuth as it is specified today has no concept of
>>> identifying a resource and audience restrict an access token led to des=
igns
>>> not utilizing audience restriction.
>>>
>>> Can any of the Google or Microsoft on this list representatives please
>>> comment?
>>>
>>> In deployments I=E2=80=98m familiar with email, calendar, contacts, clo=
ud and
>>> further services were treated as different resources and clients needed
>>> different (audience restricted) access tokens to use it.
>>>
>>> In case of YES, the locations of a user=E2=80=99s services for account
>>> information, payment initiation, identity, and electronic signature are
>>> determined based on her bank affiliation (bank identification code). In
>>> general, each of these services may be provided/operated by a different
>>> entity and exposed at completely different endpoints (even different DN=
S
>>> domains).
>>>
>>> kind regards,
>>> Torsten.
>>
>>
>

--000000000000523b890571c4823a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I&#39;m trying to understand the use case.=C2=A0<div><br><=
/div><div>It still is vague. Are you saying that each of <span style=3D"bac=
kground-color:rgb(255,255,0)">these</span> is run by a different entity, bu=
t all trust the bank as the authorization server to manage if the user has =
granted permission to use the resource rather than managing it themselves?=
=C2=A0</div><div><br></div><div><span style=3D"font-size:12.8px;text-decora=
tion-style:initial;text-decoration-color:initial;float:none;display:inline"=
><span style=3D"background-color:rgb(255,255,0)">account information, payme=
nt initiation, identity, and electronic signature</span><span style=3D"back=
ground-color:rgb(255,255,255)">=C2=A0</span></span><br></div></div><div cla=
ss=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Jul 24, 2018 at 8=
:59 AM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten=
@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> =
wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bord=
er-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><span class=3D""=
><div></div><div><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">=
And who is the AS?</div></div></blockquote><div><br></div></span>In case of=
 yes, it=E2=80=99s typically the bank. At Deutsche Telekom, it is the centr=
al AS/IDP.=C2=A0<div><br></div><div>Why are you asking?<span class=3D""><br=
><div><div><br><blockquote type=3D"cite"><div><div class=3D"gmail_extra"><b=
r><div class=3D"gmail_quote">On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodd=
erstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" ta=
rget=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex"><div dir=3D"auto"><span><div></div><div><br></div><div=
>Am 23.07.2018 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt=
@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br></div><b=
lockquote type=3D"cite"><div><div><div dir=3D"auto">In your examples, are t=
hese the same AS?</div></div></div></blockquote><div><br></div></span><div>=
yes</div><span><br><blockquote type=3D"cite"><div><div dir=3D"auto"><br></d=
iv><div dir=3D"auto"><br></div><div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt &lt;<a href=3D=
"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net<=
/a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.h=
ardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. =
It would seem that even if this was email, calendar etc. -- that those woul=
d be different scopes for the same AS, not even different resources. That i=
s how all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not obvious why one should make all those services a single OAut=
h resource. I assume the fact OAuth as it is specified today has no concept=
 of identifying a resource and audience restrict an access token led to des=
igns not utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comm=
ent?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud a=
nd further services were treated as different resources and clients needed =
different (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account info=
rmation, payment initiation, identity, and electronic signature are determi=
ned based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and ex=
posed at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></span></div></div></blockquote></div><br></=
div>

--000000000000523b890571c4823a--


From nobody Tue Jul 24 13:47:17 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A8D0130DEA for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:47:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v9p03Vo5o4lF for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:47:11 -0700 (PDT)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EE4D1277C8 for <oauth@ietf.org>; Tue, 24 Jul 2018 13:47:11 -0700 (PDT)
Received: from [84.158.238.150] (helo=[192.168.71.112]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fi4D6-0004iB-Nh; Tue, 24 Jul 2018 22:47:08 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-E83E1D74-1EE1-42D2-B87D-78C2FC810970; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com>
Date: Tue, 24 Jul 2018 22:47:07 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <D82025E1-3547-418E-97AE-E63423B734E1@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com> <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net> <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ndTKkslgI1k-1OiwjXdZOKgfmFo>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 20:47:16 -0000

--Apple-Mail-E83E1D74-1EE1-42D2-B87D-78C2FC810970
Content-Type: multipart/alternative;
	boundary=Apple-Mail-22620CA6-9570-42F4-B73A-40193FF5E48A
Content-Transfer-Encoding: 7bit


--Apple-Mail-22620CA6-9570-42F4-B73A-40193FF5E48A
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

For every bank (and their customers) there is a set of services run by the b=
ank or other entities, which rely on the AS of the particular bank for autho=
rization. In some cases, a service may bring its own AS to the party (due to=
 technical restrictionions). So an RP binding to a certain bank-specific ser=
vice ecosystem needs to determine which AS every RS relies on. Authorization=
 requests for RS relying on the same AS (the bank) can be combined into s si=
ngle request/flow resulting in an optimized UX.

> Am 24.07.2018 um 22:21 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> I'm trying to understand the use case.=20
>=20
> It still is vague. Are you saying that each of these is run by a different=
 entity, but all trust the bank as the authorization server to manage if the=
 user has granted permission to use the resource rather than managing it the=
mselves?=20
>=20
> account information, payment initiation, identity, and electronic signatur=
e=20
>=20
>> On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <torsten@lodderstedt=
.net> wrote:
>>=20
>>> And who is the AS?
>>=20
>> In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, it i=
s the central AS/IDP.=20
>>=20
>> Why are you asking?
>>=20
>>>=20
>>>> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <torsten@lodderst=
edt.net> wrote:
>>>>=20
>>>>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>>>=20
>>>>> In your examples, are these the same AS?
>>>>=20
>>>> yes
>>>>=20
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@lodderst=
edt.net> wrote:
>>>>>> Hi Dick,
>>>>>>=20
>>>>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>>>> >=20
>>>>>> > Entering in an email address that resolves to a resource makes sens=
e. It would seem that even if this was email, calendar etc. -- that those wo=
uld be different scopes for the same AS, not even different resources. That i=
s how all of Google, Microsoft work today.
>>>>>>=20
>>>>>> I don=E2=80=99t know how those services work re OAuth resources. To m=
e it=E2=80=99s not obvious why one should make all those services a single O=
Auth resource. I assume the fact OAuth as it is specified today has no conce=
pt of identifying a resource and audience restrict an access token led to de=
signs not utilizing audience restriction.=20
>>>>>>=20
>>>>>> Can any of the Google or Microsoft on this list representatives pleas=
e comment?
>>>>>>=20
>>>>>> In deployments I=E2=80=98m familiar with email, calendar, contacts, c=
loud and further services were treated as different resources and clients ne=
eded different (audience restricted) access tokens to use it.
>>>>>>=20
>>>>>> In case of YES, the locations of a user=E2=80=99s services for accoun=
t information, payment initiation, identity, and electronic signature are de=
termined based on her bank affiliation (bank identification code). In genera=
l, each of these services may be provided/operated by a different entity and=
 exposed at completely different endpoints (even different DNS domains).
>>>>>>=20
>>>>>> kind regards,
>>>>>> Torsten.
>>>=20
>=20

--Apple-Mail-22620CA6-9570-42F4-B73A-40193FF5E48A
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div>For every bank (and their c=
ustomers) there is a set of services run by the bank or other entities, whic=
h rely on the AS of the particular bank for authorization. In some cases, a s=
ervice may bring its own AS to the party (due to technical restrictionions).=
 So an RP binding to a certain bank-specific service ecosystem needs to dete=
rmine which AS every RS relies on. Authorization requests for RS relying on t=
he same AS (the bank) can be combined into s single request/flow resulting i=
n an optimized UX.</div><div><br>Am 24.07.2018 um 22:21 schrieb Dick Hardt &=
lt;<a href=3D"mailto:dick.hardt@gmail.com">dick.hardt@gmail.com</a>&gt;:<br>=
<br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">I'm trying to unde=
rstand the use case.&nbsp;<div><br></div><div>It still is vague. Are you say=
ing that each of <span style=3D"background-color:rgb(255,255,0)">these</span=
> is run by a different entity, but all trust the bank as the authorization s=
erver to manage if the user has granted permission to use the resource rathe=
r than managing it themselves?&nbsp;</div><div><br></div><div><span style=3D=
"font-size:12.8px;text-decoration-style:initial;text-decoration-color:initia=
l;float:none;display:inline"><span style=3D"background-color:rgb(255,255,0)"=
>account information, payment initiation, identity, and electronic signature=
</span><span style=3D"background-color:rgb(255,255,255)">&nbsp;</span></span=
><br></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">O=
n Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderste=
dt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"m=
argin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"au=
to"><span class=3D""><div></div><div><br></div><blockquote type=3D"cite"><di=
v><div dir=3D"ltr">And who is the AS?</div></div></blockquote><div><br></div=
></span>In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom=
, it is the central AS/IDP.&nbsp;<div><br></div><div>Why are you asking?<spa=
n class=3D""><br><div><div><br><blockquote type=3D"cite"><div><div class=3D"=
gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jul 23, 2018 at 12:50 PM=
, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodder=
stedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<b=
r><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1=
px #ccc solid;padding-left:1ex"><div dir=3D"auto"><span><div></div><div><br>=
</div><div>Am 23.07.2018 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:d=
ick.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br>=
</div><blockquote type=3D"cite"><div><div><div dir=3D"auto">In your examples=
, are these the same AS?</div></div></div></blockquote><div><br></div></span=
><div>yes</div><span><br><blockquote type=3D"cite"><div><div dir=3D"auto"><b=
r></div><div dir=3D"auto"><br></div><div><br><div class=3D"gmail_quote"><div=
 dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt &lt;<a href=
=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.ne=
t</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:=
0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comme=
nt?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></span></div></div></blockquote></div><br></d=
iv>
</div></blockquote></body></html>=

--Apple-Mail-22620CA6-9570-42F4-B73A-40193FF5E48A--

--Apple-Mail-E83E1D74-1EE1-42D2-B87D-78C2FC810970
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyNDIwNDcwN1owIwYJKoZIhvcNAQkEMRYE
FMHCsumItFgxSvSmSk/xKSj5DhyeMIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQAhSKmmmN4ehkBBfbFnw5AzinN8Vurj
JXOjoF5s/4tsGWy8Tvp7NTMLeAwhlbsyq+yzFs6JRlLF05THi/lrYpY22QTjwFeIaKpZW1Lvj4sL
o05IoflkSOIjt0QLPbOJjSQt+ZM3UGOGPz1UK5kHt2vClE0lRzYE1dMx19jq0bDvxSDSYY+32xRd
uWs1nZBAYYJSKnHLwUSkBh7JDdeYu43DNshOitEuSG1BUwHyzrRERDhZbSO6pprb2eR43QJcxYMD
X4BRoZlG7wCD5BVF4QNCcx/E/6XfNRADC4HTApxHJKYk9qs7dQrNdkKNEFz3JqVJXy4pcP7VfoTm
P+q7EJwMAAAAAAAA
--Apple-Mail-E83E1D74-1EE1-42D2-B87D-78C2FC810970--


From nobody Tue Jul 24 13:52:12 2018
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E114130EC7 for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:52:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AckctaywY4G3 for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 13:52:07 -0700 (PDT)
Received: from mail-pg1-x534.google.com (mail-pg1-x534.google.com [IPv6:2607:f8b0:4864:20::534]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C662D130EE2 for <oauth@ietf.org>; Tue, 24 Jul 2018 13:52:07 -0700 (PDT)
Received: by mail-pg1-x534.google.com with SMTP id y4-v6so3697126pgp.9 for <oauth@ietf.org>; Tue, 24 Jul 2018 13:52:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3SLuOBpxIxFTGQMzw1OXsIXvI5LgqdyA7esSjhQSl0s=; b=Igrscd02T251iSfH6a8x0CoMcrtPohnpYTS2fE5RDnBcvqRDCCXWkiN3TrDhzE/O7B X5fWh6Zh7nbeuXso2eKBQuM1t/XjKDsEGkVzLJDzzaz8lQuCNeaprCoaFDmtD0apRLUu buFTOD9giuHPeoiDC+od7yw3BsyG0x1QKyJCXMP9MZuM5xnnByMJE+tbUktZITcLPVp+ ahzRKBpGesFVpAZdVdnPp31GXAXSdG3vKTbl/w1ONAabJVsfngH+rh3rTKYZo4sUKf6v iiiiYF9LmfqFqqNBOfy/G2X2f1JQ2x9kMayxWIOnxlM2Ih+TjzSFg8iI9Jb5f8aOHili fjtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3SLuOBpxIxFTGQMzw1OXsIXvI5LgqdyA7esSjhQSl0s=; b=foO+d7smXnQ149VAhm8qGzajyBaL9gty/DFWwexzUlkvl64j4hbm9WJcxSc85j74am r3b6xsPQbfJn+cKGv2aE57rW6OWbIe7Sz363Tek6LRCfMENFcWRo6YBmEgmXc8qq6uDr K3gNeDaOzffmHPkCWd1XcgZODoaYGbBmB76rP0iYJ9f+pqTy1F6Fwr3aUmHBy91vjhpv bpuq3LweTnAX8zO+Acr3nejoTd5nD1pEED2ltlqN3aqGXkZM3eDRArTzf09oO/h5xaKZ 6n4c8iJBm+AAlRhgi1yunPniPVso+TZ9ibpEl4p5EgYh/mHdJb2RwkAuKCFS30GpcuSX NYKg==
X-Gm-Message-State: AOUpUlEP43d6OhmG7coOVal7ZaU8DBnGifMaqVV5+iOj9E04w8yedKnF wQl9nbnAT3PBSh5ln/fOqiIdoNSrVSef8/pvRsFEww==
X-Google-Smtp-Source: AAOMgpcNuuHKsQm/ApALsn5+/w0CpB518RWcDxCL2212KXR4ruK4NhdZm1ykQXXpi5KJz1fFbKW9/kp0oKibGqmIq0E=
X-Received: by 2002:a62:be03:: with SMTP id l3-v6mr19138364pff.138.1532465527313;  Tue, 24 Jul 2018 13:52:07 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a17:90a:9ce:0:0:0:0 with HTTP; Tue, 24 Jul 2018 13:51:46 -0700 (PDT)
In-Reply-To: <D82025E1-3547-418E-97AE-E63423B734E1@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com> <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net> <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com> <D82025E1-3547-418E-97AE-E63423B734E1@lodderstedt.net>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 24 Jul 2018 13:51:46 -0700
Message-ID: <CAD9ie-u3XgkEV1csyDVJ6mPnVUHqB-mtGcQbfAGozVU_FNtcMg@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: oauth@ietf.org
Content-Type: multipart/alternative; boundary="00000000000062d92d0571c4efac"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Y-RVA28pzGe70NknBNcIYeiYzF0>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Jul 2018 20:52:10 -0000

--00000000000062d92d0571c4efac
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Ok. I think I understand the use case now. Would you confirm?

These are deployed today, correct?

Today, a separate flow us required for each RS, correct?

In the future, you would like the client to ask for multiple resources that
are managed by the same AS, correct?


On Tue, Jul 24, 2018 at 1:47 PM, Torsten Lodderstedt <
torsten@lodderstedt.net> wrote:

> For every bank (and their customers) there is a set of services run by th=
e
> bank or other entities, which rely on the AS of the particular bank for
> authorization. In some cases, a service may bring its own AS to the party
> (due to technical restrictionions). So an RP binding to a certain
> bank-specific service ecosystem needs to determine which AS every RS reli=
es
> on. Authorization requests for RS relying on the same AS (the bank) can b=
e
> combined into s single request/flow resulting in an optimized UX.
>
> Am 24.07.2018 um 22:21 schrieb Dick Hardt <dick.hardt@gmail.com>:
>
> I'm trying to understand the use case.
>
> It still is vague. Are you saying that each of these is run by a
> different entity, but all trust the bank as the authorization server to
> manage if the user has granted permission to use the resource rather than
> managing it themselves?
>
> account information, payment initiation, identity, and electronic signatu=
re
>
>
> On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <
> torsten@lodderstedt.net> wrote:
>
>>
>> And who is the AS?
>>
>>
>> In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, it=
 is the
>> central AS/IDP.
>>
>> Why are you asking?
>>
>>
>> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <
>> torsten@lodderstedt.net> wrote:
>>
>>>
>>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>
>>> In your examples, are these the same AS?
>>>
>>>
>>> yes
>>>
>>>
>>>
>>>
>>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <
>>> torsten@lodderstedt.net> wrote:
>>>
>>>> Hi Dick,
>>>>
>>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>> >
>>>> > Entering in an email address that resolves to a resource makes sense=
.
>>>> It would seem that even if this was email, calendar etc. -- that those
>>>> would be different scopes for the same AS, not even different resource=
s.
>>>> That is how all of Google, Microsoft work today.
>>>>
>>>> I don=E2=80=99t know how those services work re OAuth resources. To me=
 it=E2=80=99s not
>>>> obvious why one should make all those services a single OAuth resource=
. I
>>>> assume the fact OAuth as it is specified today has no concept of
>>>> identifying a resource and audience restrict an access token led to de=
signs
>>>> not utilizing audience restriction.
>>>>
>>>> Can any of the Google or Microsoft on this list representatives please
>>>> comment?
>>>>
>>>> In deployments I=E2=80=98m familiar with email, calendar, contacts, cl=
oud and
>>>> further services were treated as different resources and clients neede=
d
>>>> different (audience restricted) access tokens to use it.
>>>>
>>>> In case of YES, the locations of a user=E2=80=99s services for account
>>>> information, payment initiation, identity, and electronic signature ar=
e
>>>> determined based on her bank affiliation (bank identification code). I=
n
>>>> general, each of these services may be provided/operated by a differen=
t
>>>> entity and exposed at completely different endpoints (even different D=
NS
>>>> domains).
>>>>
>>>> kind regards,
>>>> Torsten.
>>>
>>>
>>
>

--00000000000062d92d0571c4efac
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Ok. I think I understand the use case now. Would you =
confirm?</div><div><br></div>These are deployed today, correct?<div><br></d=
iv><div>Today, a separate flow us required for each RS, correct?</div><div>=
<br></div><div>In the future, you would like the client to ask for multiple=
 resources that are managed by the same AS, correct?</div><div><br></div></=
div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Jul 2=
4, 2018 at 1:47 PM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>=
&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0=
 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><div=
></div><div>For every bank (and their customers) there is a set of services=
 run by the bank or other entities, which rely on the AS of the particular =
bank for authorization. In some cases, a service may bring its own AS to th=
e party (due to technical restrictionions). So an RP binding to a certain b=
ank-specific service ecosystem needs to determine which AS every RS relies =
on. Authorization requests for RS relying on the same AS (the bank) can be =
combined into s single request/flow resulting in an optimized UX.</div><div=
><div class=3D"h5"><div><br>Am 24.07.2018 um 22:21 schrieb Dick Hardt &lt;<=
a href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.c=
om</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">I&=
#39;m trying to understand the use case.=C2=A0<div><br></div><div>It still =
is vague. Are you saying that each of <span style=3D"background-color:rgb(2=
55,255,0)">these</span> is run by a different entity, but all trust the ban=
k as the authorization server to manage if the user has granted permission =
to use the resource rather than managing it themselves?=C2=A0</div><div><br=
></div><div><span style=3D"font-size:12.8px;text-decoration-style:initial;t=
ext-decoration-color:initial;float:none;display:inline"><span style=3D"back=
ground-color:rgb(255,255,0)">account information, payment initiation, ident=
ity, and electronic signature</span><span style=3D"background-color:rgb(255=
,255,255)">=C2=A0</span></span><br></div></div><div class=3D"gmail_extra"><=
br><div class=3D"gmail_quote">On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodd=
erstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" ta=
rget=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex"><div dir=3D"auto"><span><div></div><div><br></div><blo=
ckquote type=3D"cite"><div><div dir=3D"ltr">And who is the AS?</div></div><=
/blockquote><div><br></div></span>In case of yes, it=E2=80=99s typically th=
e bank. At Deutsche Telekom, it is the central AS/IDP.=C2=A0<div><br></div>=
<div>Why are you asking?<span><br><div><div><br><blockquote type=3D"cite"><=
div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jul 2=
3, 2018 at 12:50 PM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a=
>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><sp=
an><div></div><div><br></div><div>Am 23.07.2018 um 13:58 schrieb Dick Hardt=
 &lt;<a href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@g=
mail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div><div dir=
=3D"auto">In your examples, are these the same AS?</div></div></div></block=
quote><div><br></div></span><div>yes</div><span><br><blockquote type=3D"cit=
e"><div><div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div><br><d=
iv class=3D"gmail_quote"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM T=
orsten Lodderstedt &lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D=
"_blank">torsten@lodderstedt.net</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.h=
ardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. =
It would seem that even if this was email, calendar etc. -- that those woul=
d be different scopes for the same AS, not even different resources. That i=
s how all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=
=E2=80=99s not obvious why one should make all those services a single OAut=
h resource. I assume the fact OAuth as it is specified today has no concept=
 of identifying a resource and audience restrict an access token led to des=
igns not utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comm=
ent?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud a=
nd further services were treated as different resources and clients needed =
different (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account info=
rmation, payment initiation, identity, and electronic signature are determi=
ned based on her bank affiliation (bank identification code). In general, e=
ach of these services may be provided/operated by a different entity and ex=
posed at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></span></div></div></blockquote></div><br></=
div>
</div></blockquote></div></div></div></blockquote></div><br></div>

--00000000000062d92d0571c4efac--


From nobody Tue Jul 24 22:21:08 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8877130FBD for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 22:21:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N-_-TwAjn3M2 for <oauth@ietfa.amsl.com>; Tue, 24 Jul 2018 22:21:02 -0700 (PDT)
Received: from smtprelay08.ispgateway.de (smtprelay08.ispgateway.de [134.119.228.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9FD09130FAE for <oauth@ietf.org>; Tue, 24 Jul 2018 22:21:01 -0700 (PDT)
Received: from [80.187.99.185] (helo=[10.154.68.6]) by smtprelay08.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fiCEK-00018V-NG; Wed, 25 Jul 2018 07:20:56 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-A8156EEE-2AA9-4CBF-9AF2-F490E0895079; protocol="application/pkcs7-signature"; micalg=sha1
Mime-Version: 1.0 (1.0)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: iPhone Mail (15F79)
In-Reply-To: <CAD9ie-u3XgkEV1csyDVJ6mPnVUHqB-mtGcQbfAGozVU_FNtcMg@mail.gmail.com>
Date: Wed, 25 Jul 2018 07:20:55 +0200
Cc: oauth@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <C8DD3E1A-1736-4F62-BF68-F5214B692732@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com> <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net> <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com> <D82025E1-3547-418E-97AE-E63423B734E1@lodderstedt.net> <CAD9ie-u3XgkEV1csyDVJ6mPnVUHqB-mtGcQbfAGozVU_FNtcMg@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/BTz5MBntf_LbFS3s1h2od5pdx_w>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jul 2018 05:21:06 -0000

--Apple-Mail-A8156EEE-2AA9-4CBF-9AF2-F490E0895079
Content-Type: multipart/alternative;
	boundary=Apple-Mail-BBB3184A-D57C-4211-9850-F8C554318115
Content-Transfer-Encoding: 7bit


--Apple-Mail-BBB3184A-D57C-4211-9850-F8C554318115
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


> Am 24.07.2018 um 22:51 schrieb Dick Hardt <dick.hardt@gmail.com>:
>=20
> Ok. I think I understand the use case now. Would you confirm?
>=20
> These are deployed today, correct?

We are building up the scheme. One banking group is deployed.

>=20
> Today, a separate flow us required for each RS, correct?

We support combined flows because this is a key requirement for us. But this=
 comes at a price: we cannot tightly audience restrict our tokens. We use ha=
ndles and Introspection to ensure every RS only gets to know the data it nee=
ds to know. And we must use sender constraint tokens in order to prevent tok=
en leakage. Having an interoperable way to obtain structured and audience re=
stricted access tokens would simply development, reduce coupling between AS &=
 RS and improve performance.

>=20
> In the future, you would like the client to ask for multiple resources tha=
t are managed by the same AS, correct?
>=20
>=20
>> On Tue, Jul 24, 2018 at 1:47 PM, Torsten Lodderstedt <torsten@lodderstedt=
.net> wrote:
>> For every bank (and their customers) there is a set of services run by th=
e bank or other entities, which rely on the AS of the particular bank for au=
thorization. In some cases, a service may bring its own AS to the party (due=
 to technical restrictionions). So an RP binding to a certain bank-specific s=
ervice ecosystem needs to determine which AS every RS relies on. Authorizati=
on requests for RS relying on the same AS (the bank) can be combined into s s=
ingle request/flow resulting in an optimized UX.
>>=20
>>> Am 24.07.2018 um 22:21 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>=20
>>> I'm trying to understand the use case.=20
>>>=20
>>> It still is vague. Are you saying that each of these is run by a differe=
nt entity, but all trust the bank as the authorization server to manage if t=
he user has granted permission to use the resource rather than managing it t=
hemselves?=20
>>>=20
>>> account information, payment initiation, identity, and electronic signat=
ure=20
>>>=20
>>>> On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <torsten@lodderste=
dt.net> wrote:
>>>>=20
>>>>> And who is the AS?
>>>>=20
>>>> In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, i=
t is the central AS/IDP.=20
>>>>=20
>>>> Why are you asking?
>>>>=20
>>>>>=20
>>>>>> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <torsten@lodder=
stedt.net> wrote:
>>>>>>=20
>>>>>>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>>>>>=20
>>>>>>> In your examples, are these the same AS?
>>>>>>=20
>>>>>> yes
>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@lodder=
stedt.net> wrote:
>>>>>>>> Hi Dick,
>>>>>>>>=20
>>>>>>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>:=

>>>>>>>> >=20
>>>>>>>> > Entering in an email address that resolves to a resource makes se=
nse. It would seem that even if this was email, calendar etc. -- that those w=
ould be different scopes for the same AS, not even different resources. That=
 is how all of Google, Microsoft work today.
>>>>>>>>=20
>>>>>>>> I don=E2=80=99t know how those services work re OAuth resources. To=
 me it=E2=80=99s not obvious why one should make all those services a single=
 OAuth resource. I assume the fact OAuth as it is specified today has no con=
cept of identifying a resource and audience restrict an access token led to d=
esigns not utilizing audience restriction.=20
>>>>>>>>=20
>>>>>>>> Can any of the Google or Microsoft on this list representatives ple=
ase comment?
>>>>>>>>=20
>>>>>>>> In deployments I=E2=80=98m familiar with email, calendar, contacts,=
 cloud and further services were treated as different resources and clients n=
eeded different (audience restricted) access tokens to use it.
>>>>>>>>=20
>>>>>>>> In case of YES, the locations of a user=E2=80=99s services for acco=
unt information, payment initiation, identity, and electronic signature are d=
etermined based on her bank affiliation (bank identification code). In gener=
al, each of these services may be provided/operated by a different entity an=
d exposed at completely different endpoints (even different DNS domains).
>>>>>>>>=20
>>>>>>>> kind regards,
>>>>>>>> Torsten.
>>>>>=20
>>>=20
>=20

--Apple-Mail-BBB3184A-D57C-4211-9850-F8C554318115
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div><br></div><div>Am 24.07.201=
8 um 22:51 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail.com">di=
ck.hardt@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div=
 dir=3D"ltr"><div>Ok. I think I understand the use case now. Would you confi=
rm?</div><div><br></div>These are deployed today, correct?</div></div></bloc=
kquote><div><br></div>We are building up the scheme. One banking group is de=
ployed.<div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div><br></d=
iv><div>Today, a separate flow us required for each RS, correct?</div></div>=
</div></blockquote><div><br></div>We support combined flows because this is a=
 key requirement for us. But this comes at a price: we cannot tightly audien=
ce restrict our tokens. We use handles and Introspection to ensure every RS o=
nly gets to know the data it needs to know. And we must use sender constrain=
t tokens in order to prevent token leakage. Having an interoperable way to o=
btain structured and audience restricted access tokens would simply developm=
ent, reduce coupling between AS &amp; RS and <span style=3D"background-color=
: rgba(255, 255, 255, 0);">improve performance.</span></div><div><br><blockq=
uote type=3D"cite"><div><div dir=3D"ltr"><div><br></div><div>In the future, y=
ou would like the client to ask for multiple resources that are managed by t=
he same AS, correct?</div><div><br></div></div><div class=3D"gmail_extra"><b=
r><div class=3D"gmail_quote">On Tue, Jul 24, 2018 at 1:47 PM, Torsten Lodder=
stedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" targe=
t=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote cl=
ass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;pa=
dding-left:1ex"><div dir=3D"auto"><div></div><div>For every bank (and their c=
ustomers) there is a set of services run by the bank or other entities, whic=
h rely on the AS of the particular bank for authorization. In some cases, a s=
ervice may bring its own AS to the party (due to technical restrictionions).=
 So an RP binding to a certain bank-specific service ecosystem needs to dete=
rmine which AS every RS relies on. Authorization requests for RS relying on t=
he same AS (the bank) can be combined into s single request/flow resulting i=
n an optimized UX.</div><div><div class=3D"h5"><div><br>Am 24.07.2018 um 22:=
21 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gmail.com" target=3D"=
_blank">dick.hardt@gmail.com</a>&gt;:<br><br></div><blockquote type=3D"cite"=
><div><div dir=3D"ltr">I'm trying to understand the use case.&nbsp;<div><br>=
</div><div>It still is vague. Are you saying that each of <span style=3D"bac=
kground-color:rgb(255,255,0)">these</span> is run by a different entity, but=
 all trust the bank as the authorization server to manage if the user has gr=
anted permission to use the resource rather than managing it themselves?&nbs=
p;</div><div><br></div><div><span style=3D"font-size:12.8px;text-decoration-=
style:initial;text-decoration-color:initial;float:none;display:inline"><span=
 style=3D"background-color:rgb(255,255,0)">account information, payment init=
iation, identity, and electronic signature</span><span style=3D"background-c=
olor:rgb(255,255,255)">&nbsp;</span></span><br></div></div><div class=3D"gma=
il_extra"><br><div class=3D"gmail_quote">On Tue, Jul 24, 2018 at 8:59 AM, To=
rsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@loddersted=
t.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><b=
lockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"><div dir=3D"auto"><span><div></div><div><br></di=
v><blockquote type=3D"cite"><div><div dir=3D"ltr">And who is the AS?</div></=
div></blockquote><div><br></div></span>In case of yes, it=E2=80=99s typicall=
y the bank. At Deutsche Telekom, it is the central AS/IDP.&nbsp;<div><br></d=
iv><div>Why are you asking?<span><br><div><div><br><blockquote type=3D"cite"=
><div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon, Jul 2=
3, 2018 at 12:50 PM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a href=3D"ma=
ilto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&=
gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto"><span><=
div></div><div><br></div><div>Am 23.07.2018 um 13:58 schrieb Dick Hardt &lt;=
<a href=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.c=
om</a>&gt;:<br><br></div><blockquote type=3D"cite"><div><div><div dir=3D"aut=
o">In your examples, are these the same AS?</div></div></div></blockquote><d=
iv><br></div></span><div>yes</div><span><br><blockquote type=3D"cite"><div><=
div dir=3D"auto"><br></div><div dir=3D"auto"><br></div><div><br><div class=3D=
"gmail_quote"><div dir=3D"ltr">On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodde=
rstedt &lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">tors=
ten@lodderstedt.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi=
 Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comme=
nt?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></span></div></div></blockquote></div><br></d=
iv>
</div></blockquote></div></div></div></blockquote></div><br></div>
</div></blockquote></div></body></html>=

--Apple-Mail-BBB3184A-D57C-4211-9850-F8C554318115--

--Apple-Mail-A8156EEE-2AA9-4CBF-9AF2-F490E0895079
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyNTA1MjA1NVowIwYJKoZIhvcNAQkEMRYE
FHrL0AYYRr937BMb/uuewr9tQOVSMIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQCpx05JOZfncP1QS3j+NHKhAWLDt77x
kaMSbBxs5LTXQijRNVhBzoD8cDc2EQGxXVC6u3YoG81OcW8ARHetwKERW5sUpgM6zeWxo95ElsCK
dNrKFjTVoEad76gzTj1VqklJGEdeht01gWHBMUGkzlegt9oNrsXn7Pcy1OxpHa4Uu7U59CHRBudZ
52iKAehXt7/as5sMlOhk2LZfyVxDj81RFwaS69CjWM3lLsjvigqF/9zvTRh1rpO/wfXof3wDAy30
RkVDuC/VBd3XJBTXGq1KCpAaksphb989ivUpTm+kpp6fpoA0g7x9SehUscJuj5rvA4L4v/ZaTalJ
MaRc+YluAAAAAAAA
--Apple-Mail-A8156EEE-2AA9-4CBF-9AF2-F490E0895079--


From nobody Wed Jul 25 01:47:26 2018
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A06EE130E51 for <oauth@ietfa.amsl.com>; Wed, 25 Jul 2018 01:47:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q6_k5-qe75uK for <oauth@ietfa.amsl.com>; Wed, 25 Jul 2018 01:47:21 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F37B8130E4A for <oauth@ietf.org>; Wed, 25 Jul 2018 01:47:20 -0700 (PDT)
Received: from [80.187.110.206] (helo=[10.110.206.20]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from <torsten@lodderstedt.net>) id 1fiFS1-00067G-Sy; Wed, 25 Jul 2018 10:47:18 +0200
Content-Type: multipart/signed; boundary=Apple-Mail-C14DF983-A490-46DF-AA87-664FDE712C8A; protocol="application/pkcs7-signature"; micalg=sha1
Content-Transfer-Encoding: 7bit
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Mime-Version: 1.0 (1.0)
Date: Wed, 25 Jul 2018 09:22:16 +0200
Message-Id: <4EEF266D-12A7-432C-A758-BF5CE14ABEEF@lodderstedt.net>
References: <CAD9ie-sW7EbfuJWc8_fkLO0wGg9kd0VR=xuO346yOoMK8ZGiyQ@mail.gmail.com> <B976F6E6-95E3-4B50-A54B-C207FA4D82A7@lodderstedt.net> <CAD9ie-sUM3jQm8pN1e4wUpSAJw=DW=xDXJS--R6icpjJsnV_AA@mail.gmail.com> <3A81E7C4-5FE1-448A-BB3D-540D30BF2637@lodderstedt.net> <CAD9ie-s2nwXovWM3OfDG8MJvs+TVzX_KearbW1Uq_6Nz9X_5mg@mail.gmail.com> <419D8DCF-817B-484F-8EB7-FEB4C5BA51DC@lodderstedt.net> <CAD9ie-tNDcWdT0iwNFYoL4x+gB6Yr=QNSjAOrV7ZjwqyLaUQeQ@mail.gmail.com> <0E9E324F-D6EB-45AB-B066-BFAA87B91A21@lodderstedt.net> <CAD9ie-uXvg=bLLeK8PzhWjd_Any5cvxDisnAdy9hquLqWwR6Fw@mail.gmail.com> <0FC092A4-9E3D-4F1A-A494-9B619F90C3AA@lodderstedt.net> <CAD9ie-tBrskz5OqYFqpTg1jiaeDXAte7f+SFx1Pqh8LLFVd7jQ@mail.gmail.com> <E9F22C9E-AD03-45B9-9BBB-E98EC84178B8@lodderstedt.net> <CAD9ie-usNZebvx4HE1Kc-ya1Fr+H_6LAPWLK2OOLdQomWVP-tw@mail.gmail.com> <D82025E1-3547-418E-97AE-E63423B734E1@lodderstedt.net> <CAD9ie-u3XgkEV1csyDVJ6mPnVUHqB-mtGcQbfAGozVU_FNtcMg@mail.gmail.com> <C8DD3E1A-1736-4F62-BF68-F5214B692732@lodderstedt .net>
Cc: oauth@ietf.org
In-Reply-To: <C8DD3E1A-1736-4F62-BF68-F5214B692732@lodderstedt.net>
To: Dick Hardt <dick.hardt@gmail.com>
X-Mailer: iPhone Mail (15F79)
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/rorKH1Di7RvzfpACYc1Rxv2jrqE>
Subject: Re: [OAUTH-WG] updated Distributed OAuth ID
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jul 2018 08:47:25 -0000

--Apple-Mail-C14DF983-A490-46DF-AA87-664FDE712C8A
Content-Type: multipart/alternative;
	boundary=Apple-Mail-426114DA-557F-469C-B65A-20DEF9101C17
Content-Transfer-Encoding: 7bit


--Apple-Mail-426114DA-557F-469C-B65A-20DEF9101C17
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable


>=20
> We are building up the scheme. One banking group is deployed.
>=20
>>=20
>> Today, a separate flow us required for each RS, correct?
>=20
> We support combined flows because this is a key requirement for us. But th=
is comes at a price: we cannot tightly audience restrict our tokens. We use h=
andles and Introspection to ensure every RS only gets to know the data it ne=
eds to know. And we must use sender constraint tokens in order to prevent to=
ken leakage. Having an interoperable way to obtain structured and audience r=
estricted access tokens would simply development, reduce coupling between AS=
 & RS and improve performance.

I forgot to mention, a deployment supporting strict resource server specific=
 audience restriction with structured access tokens is in place at Deutsche T=
elekom for years now ( even predating OAuth 2.0). As the only drawback, enco=
ding of resource servers in scopes and refresh token handling to obtain RS-s=
pecific access tokens is proprietary.

>=20
>>=20
>> In the future, you would like the client to ask for multiple resources th=
at are managed by the same AS, correct?
>>=20
>>=20
>>> On Tue, Jul 24, 2018 at 1:47 PM, Torsten Lodderstedt <torsten@loddersted=
t.net> wrote:
>>> For every bank (and their customers) there is a set of services run by t=
he bank or other entities, which rely on the AS of the particular bank for a=
uthorization. In some cases, a service may bring its own AS to the party (du=
e to technical restrictionions). So an RP binding to a certain bank-specific=
 service ecosystem needs to determine which AS every RS relies on. Authoriza=
tion requests for RS relying on the same AS (the bank) can be combined into s=
 single request/flow resulting in an optimized UX.
>>>=20
>>>> Am 24.07.2018 um 22:21 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>>=20
>>>> I'm trying to understand the use case.=20
>>>>=20
>>>> It still is vague. Are you saying that each of these is run by a differ=
ent entity, but all trust the bank as the authorization server to manage if t=
he user has granted permission to use the resource rather than managing it t=
hemselves?=20
>>>>=20
>>>> account information, payment initiation, identity, and electronic signa=
ture=20
>>>>=20
>>>>>> On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <torsten@lodders=
tedt.net> wrote:
>>>>>>=20
>>>>>> And who is the AS?
>>>>>=20
>>>>> In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom, i=
t is the central AS/IDP.=20
>>>>>=20
>>>>> Why are you asking?
>>>>>=20
>>>>>>=20
>>>>>>>> On Mon, Jul 23, 2018 at 12:50 PM, Torsten Lodderstedt <torsten@lodd=
erstedt.net> wrote:
>>>>>>>>=20
>>>>>>>=20
>>>>>>>> Am 23.07.2018 um 13:58 schrieb Dick Hardt <dick.hardt@gmail.com>:
>>>>>>>>=20
>>>>>>>> In your examples, are these the same AS?
>>>>>>>=20
>>>>>>> yes
>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>> On Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt <torsten@lodde=
rstedt.net> wrote:
>>>>>>>>> Hi Dick,
>>>>>>>>>=20
>>>>>>>>> > Am 23.07.2018 um 00:52 schrieb Dick Hardt <dick.hardt@gmail.com>=
:
>>>>>>>>> >=20
>>>>>>>>> > Entering in an email address that resolves to a resource makes s=
ense. It would seem that even if this was email, calendar etc. -- that those=
 would be different scopes for the same AS, not even different resources. Th=
at is how all of Google, Microsoft work today.
>>>>>>>>>=20
>>>>>>>>> I don=E2=80=99t know how those services work re OAuth resources. T=
o me it=E2=80=99s not obvious why one should make all those services a singl=
e OAuth resource. I assume the fact OAuth as it is specified today has no co=
ncept of identifying a resource and audience restrict an access token led to=
 designs not utilizing audience restriction.=20
>>>>>>>>>=20
>>>>>>>>> Can any of the Google or Microsoft on this list representatives pl=
ease comment?
>>>>>>>>>=20
>>>>>>>>> In deployments I=E2=80=98m familiar with email, calendar, contacts=
, cloud and further services were treated as different resources and clients=
 needed different (audience restricted) access tokens to use it.
>>>>>>>>>=20
>>>>>>>>> In case of YES, the locations of a user=E2=80=99s services for acc=
ount information, payment initiation, identity, and electronic signature are=
 determined based on her bank affiliation (bank identification code). In gen=
eral, each of these services may be provided/operated by a different entity a=
nd exposed at completely different endpoints (even different DNS domains).
>>>>>>>>>=20
>>>>>>>>> kind regards,
>>>>>>>>> Torsten.
>>>>>>=20
>>>>=20
>>=20

--Apple-Mail-426114DA-557F-469C-B65A-20DEF9101C17
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div></div><div><br></div><blockquote type=3D=
"cite"><div><div><br></div>We are building up the scheme. One banking group i=
s deployed.<div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><div><br=
></div><div>Today, a separate flow us required for each RS, correct?</div></=
div></div></blockquote><div><br></div>We support combined flows because this=
 is a key requirement for us. But this comes at a price: we cannot tightly a=
udience restrict our tokens. We use handles and Introspection to ensure ever=
y RS only gets to know the data it needs to know. And we must use sender con=
straint tokens in order to prevent token leakage. Having an interoperable wa=
y to obtain structured and audience restricted access tokens would simply de=
velopment, reduce coupling between AS &amp; RS and <span style=3D"background=
-color: rgba(255, 255, 255, 0);">improve performance.</span></div></div></bl=
ockquote><div><br></div>I forgot to mention, a deployment supporting strict r=
esource server specific audience restriction with structured access tokens i=
s in place at Deutsche Telekom for years now ( even predating OAuth 2.0). As=
 the only drawback, encoding of resource servers in scopes and refresh token=
 handling to obtain RS-specific access tokens is proprietary.<div><br><block=
quote type=3D"cite"><div><div><br><blockquote type=3D"cite"><div><div dir=3D=
"ltr"><div><br></div><div>In the future, you would like the client to ask fo=
r multiple resources that are managed by the same AS, correct?</div><div><br=
></div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tu=
e, Jul 24, 2018 at 1:47 PM, Torsten Lodderstedt <span dir=3D"ltr">&lt;<a hre=
f=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.n=
et</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"auto">=
<div></div><div>For every bank (and their customers) there is a set of servi=
ces run by the bank or other entities, which rely on the AS of the particula=
r bank for authorization. In some cases, a service may bring its own AS to t=
he party (due to technical restrictionions). So an RP binding to a certain b=
ank-specific service ecosystem needs to determine which AS every RS relies o=
n. Authorization requests for RS relying on the same AS (the bank) can be co=
mbined into s single request/flow resulting in an optimized UX.</div><div><d=
iv class=3D"h5"><div><br>Am 24.07.2018 um 22:21 schrieb Dick Hardt &lt;<a hr=
ef=3D"mailto:dick.hardt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a=
>&gt;:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">I'm tryi=
ng to understand the use case.&nbsp;<div><br></div><div>It still is vague. A=
re you saying that each of <span style=3D"background-color:rgb(255,255,0)">t=
hese</span> is run by a different entity, but all trust the bank as the auth=
orization server to manage if the user has granted permission to use the res=
ource rather than managing it themselves?&nbsp;</div><div><br></div><div><sp=
an style=3D"font-size:12.8px;text-decoration-style:initial;text-decoration-c=
olor:initial;float:none;display:inline"><span style=3D"background-color:rgb(=
255,255,0)">account information, payment initiation, identity, and electroni=
c signature</span><span style=3D"background-color:rgb(255,255,255)">&nbsp;</=
span></span><br></div></div><div class=3D"gmail_extra"><br><div class=3D"gma=
il_quote">On Tue, Jul 24, 2018 at 8:59 AM, Torsten Lodderstedt <span dir=3D"=
ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torste=
n@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><di=
v dir=3D"auto"><span><div></div><div><br></div><blockquote type=3D"cite"><di=
v><div dir=3D"ltr">And who is the AS?</div></div></blockquote><div><br></div=
></span>In case of yes, it=E2=80=99s typically the bank. At Deutsche Telekom=
, it is the central AS/IDP.&nbsp;<div><br></div><div>Why are you asking?<spa=
n><br><div><div><br><blockquote type=3D"cite"><div><div class=3D"gmail_extra=
"><br><div class=3D"gmail_quote">On Mon, Jul 23, 2018 at 12:50 PM, Torsten L=
odderstedt <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" t=
arget=3D"_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex"><div dir=3D"auto"><span><div></div><div><br></div><div>A=
m 23.07.2018 um 13:58 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.hardt@gm=
ail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br><br></div><block=
quote type=3D"cite"><div><div><div dir=3D"auto">In your examples, are these t=
he same AS?</div></div></div></blockquote><div><br></div></span><div>yes</di=
v><span><br><blockquote type=3D"cite"><div><div dir=3D"auto"><br></div><div d=
ir=3D"auto"><br></div><div><br><div class=3D"gmail_quote"><div dir=3D"ltr">O=
n Mon, Jul 23, 2018 at 3:42 AM Torsten Lodderstedt &lt;<a href=3D"mailto:tor=
sten@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>&gt; wrot=
e:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">Hi Dick,<br>
<br>
&gt; Am 23.07.2018 um 00:52 schrieb Dick Hardt &lt;<a href=3D"mailto:dick.ha=
rdt@gmail.com" target=3D"_blank">dick.hardt@gmail.com</a>&gt;:<br>
&gt; <br>
&gt; Entering in an email address that resolves to a resource makes sense. I=
t would seem that even if this was email, calendar etc. -- that those would b=
e different scopes for the same AS, not even different resources. That is ho=
w all of Google, Microsoft work today.<br>
<br>
I don=E2=80=99t know how those services work re OAuth resources. To me it=E2=
=80=99s not obvious why one should make all those services a single OAuth re=
source. I assume the fact OAuth as it is specified today has no concept of i=
dentifying a resource and audience restrict an access token led to designs n=
ot utilizing audience restriction. <br>
<br>
Can any of the Google or Microsoft on this list representatives please comme=
nt?<br>
<br>
In deployments I=E2=80=98m familiar with email, calendar, contacts, cloud an=
d further services were treated as different resources and clients needed di=
fferent (audience restricted) access tokens to use it.<br>
<br>
In case of YES, the locations of a user=E2=80=99s services for account infor=
mation, payment initiation, identity, and electronic signature are determine=
d based on her bank affiliation (bank identification code). In general, each=
 of these services may be provided/operated by a different entity and expose=
d at completely different endpoints (even different DNS domains).<br>
<br>
kind regards,<br>
Torsten.</blockquote></div></div>
</div></blockquote></span></div></blockquote></div><br></div>
</div></blockquote></div></div></span></div></div></blockquote></div><br></d=
iv>
</div></blockquote></div></div></div></blockquote></div><br></div>
</div></blockquote></div></div></blockquote></div></body></html>=

--Apple-Mail-426114DA-557F-469C-B65A-20DEF9101C17--

--Apple-Mail-C14DF983-A490-46DF-AA87-664FDE712C8A
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKhzCCBTow
ggQioAMCAQICEQCSJtR3C5gtrmIWapJ6EgOVMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQGEwJH
QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQK
ExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVudGlj
YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xODAxMDQwMDAwMDBaFw0xOTAxMDQyMzU5NTla
MCgxJjAkBgkqhkiG9w0BCQEWF3RvcnN0ZW5AbG9kZGVyc3RlZHQubmV0MIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEAv7DF8qZUUXBAJoSmv9yoqrhhGdqD8LF+dInQfkJNYgRBtTohMg+p
Uy6TOfwPMJL7nxFZQKeROtLGcFCxoZAEtpXso6m7P3GcYleN1waJRH981U81XzH2clCg9+YRnIUp
vof1EPRFyBgaVuLYiTlgVccBQ/n73mUAVkP5a9UOVblWAeQvGCvsV2TlPNCOXOtphvG137/0s048
LsHqWgtNW/Ev/2OoAdaFj5fCk70OB8jI9RZupXh5sUeznlHInWtnk7t8hL+HjeNVN0mtHubZ8btp
WfStV7PT3erDhFgwLg984+00kzGdCxXHsIWPa2vb2TWKrpEJrBK8ZDY8oqX+DwIDAQABo4IB7TCC
AekwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8AwHQYDVR0OBBYEFOGxsCWszkCbF4VK
6r3xiP6+8T0lMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUF
BwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIx
AQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwWgYDVR0f
BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPUlNBQ2xpZW50QXV0aGVu
dGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYBBQUHAQEEfzB9MFUGCCsGAQUFBzAC
hklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlvbmFu
ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w
IgYDVR0RBBswGYEXdG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBALA6
7MMPtwJynHzvV7nqHNhd78IX9df4ZZPBPv42mZbyCyXgMhbESSO4bGDQTcSpdJzgIueIGl6k4+SQ
koKJHGoKUKtMg5nYwk7X5yrr2JNxwGaCOwLR1W/uU092icWT56lT/3scU1Hmv9l/hXnSHaiqqcU6
xi+taGoHWtb61IzTYk7ezv4UUSBzJdutobWBuI0nNI4eSk6c9IXZoyhOcV7Egw4BFciQhP/KxveM
5x71yWvS1b7yp1CCaPypBuUdqag/WVc+vR1IdmQbk4Es0Ku25ohUh40pDdDX62iBpUSnukzTgTJe
Q0oBmeTidCoa+V8FEF9OAcI7TqUEd1YAHPYwggVFMIIELaADAgECAhAz25rGqsI3mWtz8QN7mfC0
MA0GCSqGSIb3DQEBCwUAMIGbMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVz
dGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDFBMD8GA1UE
AxM4Q09NT0RPIFNIQS0yNTYgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwg
Q0EwHhcNMTcwMTA5MDAwMDAwWhcNMTgwMTA5MjM1OTU5WjAoMSYwJAYJKoZIhvcNAQkBFhd0b3Jz
dGVuQGxvZGRlcnN0ZWR0Lm5ldDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK7Bks2c
s/S6vUkVvUr3uSvJ+ZVoaZTghOhx94DMntdg4zqZBRWbdG+97duxte17KellMR4TXr3+3JNAFKb2
FDwhwalRiUiFhfYVgKEhQoEAAjqIf3AxW889T7DGPBJezpiLrOCV7WOP1XaEiIRT94cwE2zQIN9i
qfjfL7U7ik8G4J4syUss2U2K7LbZ9y5sGNex1PlPb15aDLrOVP5Z+AA2cdM8sg0rAOoLT8V2CaW4
Ek5x3JFWec30fNILiGed/GNqqrKreVWkkUkdqEMxPxxE5CnP6HT1Yaga1y8r50hZAj6wF1dO63L8
JD7x2XmFbuEHVVsjthyEOItsfa+Zu0sCAwEAAaOCAfUwggHxMB8GA1UdIwQYMBaAFJJha4LhoqCq
T+xn8cKj97SAAMHsMB0GA1UdDgQWBBT54B4FcTmexko4vyFuGCTAY9NjxzAOBgNVHQ8BAf8EBAMC
BaAwDAYDVR0TAQH/BAIwADAgBgNVHSUEGTAXBggrBgEFBQcDBAYLKwYBBAGyMQEDBQIwEQYJYIZI
AYb4QgEBBAQDAgUgMEYGA1UdIAQ/MD0wOwYMKwYBBAGyMQECAQEBMCswKQYIKwYBBQUHAgEWHWh0
dHBzOi8vc2VjdXJlLmNvbW9kby5uZXQvQ1BTMF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9jcmwu
Y29tb2RvY2EuY29tL0NPTU9ET1NIQTI1NkNsaWVudEF1dGhlbnRpY2F0aW9uYW5kU2VjdXJlRW1h
aWxDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMFgGCCsGAQUFBzAChkxodHRwOi8vY3J0LmNvbW9k
b2NhLmNvbS9DT01PRE9TSEEyNTZDbGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0Eu
Y3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wIgYDVR0RBBswGYEXdG9y
c3RlbkBsb2RkZXJzdGVkdC5uZXQwDQYJKoZIhvcNAQELBQADggEBAAJrnsh44si9amIH3voVUrBr
ipYHL4wgHxvCWquPLQtCIz/KR/7RouLi/Qh1Xy51d6Sw544OjNrr6RAae3K2WXJ0jy3lbLPrZIcL
/heyEmEMk+H5TZKlVG/J33sGwj3CDddzm36VO65V6CGqxBKZUKOErspmFZbkMUyzhSpuUDjBeCQT
MP648uLfeSezHafTRVM0KyjyQ2idia/03E1xXIy7zVZjAYytPefWvb9f9ZokR3dQwbE4dSrwYoBD
lDTMb0+blLQev7YqA2agQw5PBr3Z6P8Zsnt2ImrEuyYDERKuVnF6qVhruZDBWTBjxL8jx3gWXqsc
d2pn+CJlZ2elr4MxggPAMIIDvAIBATCBrTCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0
ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0
ZWQxPTA7BgNVBAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg
RW1haWwgQ0ECEQCSJtR3C5gtrmIWapJ6EgOVMAkGBSsOAwIaBQCgggHnMBgGCSqGSIb3DQEJAzEL
BgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTE4MDcyNTA3MjIxN1owIwYJKoZIhvcNAQkEMRYE
FF8dXu/DLYQpMy+pfSqJj2yZlJ83MIHBBgkrBgEEAYI3EAQxgbMwgbAwgZsxCzAJBgNVBAYTAkdC
MRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoT
EUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhDT01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVu
dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQM9uaxqrCN5lrc/EDe5nwtDCBwwYLKoZIhvcN
AQkQAgsxgbOggbAwgZsxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
EDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBMaW1pdGVkMUEwPwYDVQQDEzhD
T01PRE8gU0hBLTI1NiBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQ
M9uaxqrCN5lrc/EDe5nwtDANBgkqhkiG9w0BAQEFAASCAQCPeoDaa2EIpwNJi2fwmYo5SZf6C41H
hXD5GUy90mrYaAbTAMkptPi3UYkQC2/qpTAMya5s0kwIF/olsyft6Xzc6htV8RZG5Zy2MmnQT3jY
9IBDxw1k8TNu85WSkXQzzT1fB04Qv71PS5SWPif8z09rpMKpo3z/iSIK4gZLu7U7k6F3vZMGyWHO
CQtdlru/ren9VaHfdJSQk/iQ8/7lg3qgszmhKooQbxg+2g941+GIOVfg7WZQyjEoWx43jNHhmgej
mudtPp3gL84m8DwO9RewdxWriWfjFPurxwFOUrXMswYZCS/RPJYsyvXwQBCWZ3DUZ1WLQDxL8WMb
eVQw4dX/AAAAAAAA
--Apple-Mail-C14DF983-A490-46DF-AA87-664FDE712C8A--


From nobody Sun Jul 29 09:26:12 2018
Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E593130E01; Sun, 29 Jul 2018 09:26:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alexey Melnikov <aamelnikov@fastmail.fm>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-oauth-device-flow@ietf.org, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth-chairs@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153288156357.7132.7206843681571127621.idtracker@ietfa.amsl.com>
Date: Sun, 29 Jul 2018 09:26:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/HiQ9j-1EpNMbwcRQVKt5wmKEFj4>
Subject: [OAUTH-WG] Alexey Melnikov's No Objection on draft-ietf-oauth-device-flow-11: (with COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Jul 2018 16:26:04 -0000

Alexey Melnikov has entered the following ballot position for
draft-ietf-oauth-device-flow-11: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

This is generally a fine document and it was easy to follow.

I am agreeing with Benjamin's DISCUSS about amount of entropy in codes.

In addition, the last para in Section 6.1 reads:

   The server should ignore any characters like punctuation that are not
   in the user-code character set.  Provided that the character set
   doesn't include characters of different case, the comparison should
   be case insensitive.

This makes me uncomfortable, because you are talking of case-insensitivity,
without fully specifying what it is. I assume that your advice only
applies to user-code character sets which only use subset of ASCII?
Because if you mean to extend your advice to full Unicode, you need more text
and references here. Can you please clarify.



From nobody Mon Jul 30 22:30:26 2018
Return-Path: <adam@nostrum.com>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F88B129385; Mon, 30 Jul 2018 22:30:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Adam Roach <adam@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-oauth-device-flow@ietf.org, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth-chairs@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153301502438.7978.5847796028555208466.idtracker@ietfa.amsl.com>
Date: Mon, 30 Jul 2018 22:30:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/C1CGfU89ggDKQUayFd-7h_aVtWc>
Subject: [OAUTH-WG] Adam Roach's Discuss on draft-ietf-oauth-device-flow-11: (with DISCUSS and COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 05:30:24 -0000

Adam Roach has entered the following ballot position for
draft-ietf-oauth-device-flow-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thanks to everyone who worked on this document. I have a couple of related
issues that need to be cleared up before publication, but I expect that these
should be easy to resolve.

Â§3.1:

>  The client initiates the flow by requesting a set of verification
>  codes from the authorization server by making an HTTP "POST" request
>  to the device authorization endpoint.  The client constructs the
>  request with the following parameters, encoded with the "application/
>  x-www-form-urlencoded" content type:

This document needs a normative citation for this media type.

My suggestion would be to cite REC-html5-20141028 section 4.10.22.6, as this
appears to be the most recent stable description of how to encode this media
type. I'd love to hear rationale behind other citations being more appropriate,
since I'm not entirely happy with the one I suggest above (given that it's been
superseded by HTML 5.2); but every other plausible citation I can find is even
less palatable (with HTML 5.2 itself having the drawback of not actually
defining how to encode the media type, instead pointing to an unstable,
unversioned document).

(Non-discuss comment: this passage could be made clearer by saying something
like "...parameters, sent as the body of the request, encoded with the...")

---------------------------------------------------------------------------

Â§3.2:

>  In response, the authorization server generates a device verification
>  code and an end-user code that are valid for a limited time and
>  includes them in the HTTP response body using the "application/json"
>  format with a 200 (OK) status code.

This needs to normatively cite RFC 7159.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Â§3.5:

>  slow_down
>     The client is polling too quickly and should back off at a
>     reasonable rate.

I'm surprised the document doesn't define what is meant by "reasonable rate"
here. I would expect to see something concrete like "the client should double
the interval between polling requests" or some similarly concrete advice.


>  If no interval was provided, the client
>  MUST use a reasonable default polling interval.

Similarly, I'm really sad that this does not give concrete guidance for what
"reasonable" might be. Implementations may well decide 100ms is "reasonable" for
the purpose of application responsiveness -- but I suspect average OAuth servers
wouldn't be happy with that.

This would be a DISCUSS, but I see that Mirja has already registered a DISCUSS
on this topic. I support her DISCUSS.

---------------------------------------------------------------------------

Â§6.1:

This section discusses code input by the user. I'm surprised that it doesn't
also discuss confusability considerations (e.g., I, l, and 1; 0 and O)

===========================================================================

All of my remaining comments are minor editorial nits.

---------------------------------------------------------------------------

Abstract:

>  This OAuth 2.0 authorization flow for browserless and input
>  constrained devices

Nit: "...input-constrained..."

>  This OAuth 2.0 authorization flow for browserless and input
>  constrained devices, often referred to as the device flow, enables
>  OAuth clients to request user authorization from devices that have an
>  Internet connection, but don't have an easy input method (such as a
>  smart TV, media console, picture frame, or printer), or lack a
>  suitable browser for a more traditional OAuth flow.

This is a very long and winding sentence. Consider breaking up into multiple
sentences.

---------------------------------------------------------------------------

Â§1:

>  This OAuth 2.0 protocol flow for browserless and input constrained

Nit: "...input-constrained..."

Please cite RFC 6749 here.

---------------------------------------------------------------------------

Â§1:

>  The only requirements to use this flow are that the device is
>  connected to the Internet, and able to make outbound HTTPS requests,
>  be able to display or otherwise communicate a URI and code sequence
>  to the user, and that the user has a secondary device (e.g., personal
>  computer or smartphone) from which to process the request.

This is hard to read, and difficult to pack into one sentence (due to the
requirements being on both the device and its user). Consider reworking into a
bulleted list; e.g.:

   The only requirements to use this flow are:

     * The device is connected to the Internet
     * The device is able to make outbound HTTPS requests
     * The device is able to display or otherwise communicate a URI and code
       sequence to the user
     * The user has a secondary device (e.g., personal computer or smartphone)
       from which they can process the request

---------------------------------------------------------------------------

Â§1:

>  Instead of interacting with the end-user's user-agent, the client

Nit: "...end user's user agent..."

>  instructs the end-user to use another computer or device and connect

Nit: "...end user..."

---------------------------------------------------------------------------

Â§1:

>     (C) The client instructs the end-user to use its user-agent

Nit: "...end user..."

Nit: "...user agent..."

>     client provides the end-user with the end-user code to enter in

Nit: "...provides the end user with the end-user code..."

---------------------------------------------------------------------------

Â§1:

>     (D) The authorization server authenticates the end-user (via the

"...the end user..."

>     user-agent) and prompts the end-user to grant the client's access

"...user agent... end user..."

>     request.  If the end-user agrees to the client's access request,

"...the end user..."

>     the end-user enters the end-user code provided by the client.  The

"...the end user enters the end-user code..."

>     authorization server validates the end-user code provided by the
>     end-user.

"...by the end user."

---------------------------------------------------------------------------

Â§1:

>     (E) While the end-user authorizes (or denies) the client's request

"...the end user..."

>     (step D), the client repeatedly polls the authorization server to
>     find out if the end-user completed the end-user authorization

"...the end user completed the end-user authorization..."


---------------------------------------------------------------------------

Â§1:

>     (F) Assuming the end-user granted access, the authorization server

"...the end user..."

---------------------------------------------------------------------------

Â§2:

>  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>  "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
>  "OPTIONAL" in this document are to be interpreted as described in
>  [RFC2119].

Consider updating to use the boilerplate specified in RFC 8174.

---------------------------------------------------------------------------

Â§2:

>  End-User Verification Code:
>     A short-lived token which the device displays to the end user, is
>     entered by the end-user on the authorization server, and is thus

"...end user..."

>     used to bind the device to the end-user.

"...end user..."

---------------------------------------------------------------------------

Â§3.3:

>  session.  The authorization server prompts the end-user to identify

"...end user..."

---------------------------------------------------------------------------

Â§5.1:

>  In some applications this
>  attack may not make much economic sense, for example for a video app,
>  the owner of the device may then be able to purchase movies with the
>  attacker's account, however there are still privacy considerations in
>  that case as well as other uses of the device flow whereby the
>  granting account may be able to perform sensitive actions such as
>  controlling the victim's device.

This is a run-on sentence. Restructure by replacing the commas after "sense" and
"account" with either semicolons or periods.

---------------------------------------------------------------------------

Â§5.2:

>  malicious, then it could man-in-the middle the backchannel flow to

"...man-in-the-middle..."

>  middle is not completely hidden from sight, as the end-user would end

"...end user..."



From nobody Mon Jul 30 23:17:24 2018
Return-Path: <adam@nostrum.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B06DA130DC0; Mon, 30 Jul 2018 23:17:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.879
X-Spam-Level: 
X-Spam-Status: No, score=-1.879 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a0R7VWRM37Bo; Mon, 30 Jul 2018 23:17:20 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C9FE130934; Mon, 30 Jul 2018 23:17:19 -0700 (PDT)
Received: from Svantevit.local (99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w6V6HFia036226 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 31 Jul 2018 01:17:15 -0500 (CDT) (envelope-from adam@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host 99-152-146-228.lightspeed.dllstx.sbcglobal.net [99.152.146.228] claimed to be Svantevit.local
From: Adam Roach <adam@nostrum.com>
To: The IESG <iesg@ietf.org>
Cc: oauth@ietf.org, oauth-chairs@ietf.org, draft-ietf-oauth-device-flow@ietf.org, rifaat.ietf@gmail.com
References: <153301502438.7978.5847796028555208466.idtracker@ietfa.amsl.com>
Message-ID: <8491735a-6fcc-8970-9d4f-5e41b3c8aa9f@nostrum.com>
Date: Tue, 31 Jul 2018 01:17:09 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <153301502438.7978.5847796028555208466.idtracker@ietfa.amsl.com>
Content-Type: multipart/alternative; boundary="------------43B5C22E6C8C947D007F3FDD"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/fAoUtQLzalxj9l_ndJJ1q7FdeTk>
Subject: Re: [OAUTH-WG] Adam Roach's Discuss on draft-ietf-oauth-device-flow-11: (with DISCUSS and COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 06:17:22 -0000

This is a multi-part message in MIME format.
--------------43B5C22E6C8C947D007F3FDD
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

On 7/31/18 12:30 AM, Adam Roach wrote:
> Â§3.2:
>
>>   In response, the authorization server generates a device verification
>>   code and an end-user code that are valid for a limited time and
>>   includes them in the HTTP response body using the "application/json"
>>   format with a 200 (OK) status code.
> This needs to normatively cite RFC 7159.


Thanks to Carsten for reminding me that this has been replaced by RFC 
8259. Sorry for confusing things.

/a


--------------43B5C22E6C8C947D007F3FDD
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <div class="moz-cite-prefix">On 7/31/18 12:30 AM, Adam Roach wrote:<br>
    </div>
    <blockquote type="cite"
cite="mid:153301502438.7978.5847796028555208466.idtracker@ietfa.amsl.com">
      <pre wrap="">Â§3.2:

</pre>
      <blockquote type="cite" style="color: #000000;">
        <pre wrap=""> In response, the authorization server generates a device verification
 code and an end-user code that are valid for a limited time and
 includes them in the HTTP response body using the "application/json"
 format with a 200 (OK) status code.
</pre>
      </blockquote>
      <pre wrap="">This needs to normatively cite RFC 7159.</pre>
    </blockquote>
    <p><br>
    </p>
    <p>Thanks to Carsten for reminding me that this has been replaced by
      RFC 8259. Sorry for confusing things.</p>
    <p>/a<br>
    </p>
  </body>
</html>

--------------43B5C22E6C8C947D007F3FDD--


From nobody Tue Jul 31 08:58:20 2018
Return-Path: <alissa@cooperw.in>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 33BFE130EF4; Tue, 31 Jul 2018 08:58:10 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alissa Cooper <alissa@cooperw.in>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-oauth-device-flow@ietf.org, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, oauth-chairs@ietf.org, rifaat.ietf@gmail.com, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153305269020.3071.5881779499900104302.idtracker@ietfa.amsl.com>
Date: Tue, 31 Jul 2018 08:58:10 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/NZ0xjrN8ZzRQZWbIlGZS5XuV3TY>
Subject: [OAUTH-WG] Alissa Cooper's No Objection on draft-ietf-oauth-device-flow-11: (with COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 15:58:11 -0000

Alissa Cooper has entered the following ballot position for
draft-ietf-oauth-device-flow-11: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-device-flow/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I support Mirja's DISCUSS point #3 which was also raised by the Gen-ART
reviewer. The Gen-ART review also included a number of other useful comments.
Please address them.

Perhaps this is implicit, but I found it a little odd that there is no mention
of whether the device codes and user codes are expected to be unique to
individual devices.

Section 3.3:

"It is NOT RECOMMENDED for authorization servers to include the user
   code in the verification URI ("verification_uri"), as this increases
   the length and complexity of the URI that the user must type."

I don't fully understand the justification for the normative requirement here.
The user ultimately ends up typing in both strings, right? Is it so much more
complex to type them both into a browser bar contiguously than to type the uri
into the browser bar and the code into some form field on the page such that
the normative requirement is warranted?

Section 3.3.1:

Wouldn't there be textual instructions about how to use the QR code also
included here? If the point is to illustrate the UI it seems like those should
be included too.



From nobody Tue Jul 31 08:58:48 2018
Return-Path: <alissa@cooperw.in>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A909D126F72; Tue, 31 Jul 2018 08:58:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.821
X-Spam-Level: 
X-Spam-Status: No, score=-0.821 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=oCx06RQY; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=cBo36DdD
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S1L92qBZRGSD; Tue, 31 Jul 2018 08:58:44 -0700 (PDT)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3961130F0A; Tue, 31 Jul 2018 08:58:44 -0700 (PDT)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 94F3121D45; Tue, 31 Jul 2018 11:58:43 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute7.internal (MEProxy); Tue, 31 Jul 2018 11:58:43 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=9R11wHfhqtj2GK0kkq/WqaStD48rw Rgc5BkK6SATf7A=; b=oCx06RQYw5MD+zCCEWo/RCCWP34GlL/P5EEbYbv7xMUzH uTyidFbVBIZYapyG2kcUlXpbquKF5ZcYybB+qnufOKdRLoyRtWjQUk3D6DDocnnA N9xIhAMNq1qBfGVqKhIyRp+M2IT462e7KRw7PALtDjwLYQjAnZUoW8D6xtRBmubB 8jFdfCqkHDcOfSf5pSPZ7dtbB6YSga3He9qMQb4Hs3JiiFzxZovXK+BpLLQOKHI2 pJPDBUJ64xwkCArOot2Z2C7Pe2A9NHdyYp0HP9XSAtReo8yKTmotUdetnDJa314P 81rCfpTSUorOB/9OzkYro4G/hQFsnZ28RE6yZpXcw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=9R11wH fhqtj2GK0kkq/WqaStD48rwRgc5BkK6SATf7A=; b=cBo36DdDQE9USqtQCjF5T/ 76YwuWT3qcn0BBCFpvD+OwszajtDrBxD9kgGUiVo0F4A6kKslIQ0HCU1UH6JLtjC +WVQPw/C7KZdCGlOWCsNpqjy1AtvR4yhC2u1nuaXBU86yjFJOmVPIT8jy23rY78+ XnhN1UUCvwYHIyI/4BycHNLfRJalnJ+plaYFKuYguiPD3sSpTlwRFz2K7EX3AOVZ 9Vzx+hLD9MvKCU54NSqz7mjGyhU+D/GVlSw3CSEd8UUi5/g2gyzWyeHqp0dnkpIV 7v5NDgmChHMckYxEMZHwWA0oc0aDolFRhulVqNo2Ch8TouhPRrjPkr8XihZjfQ/w ==
X-ME-Proxy: <xmx:M4dgW6zXQCjn7VEBjDyrApzlFesHcUNQt8XBpnNofUvNtyfJp0N12g> <xmx:M4dgWxuqhq4Egaug1vf2K0fJGvCWgrUN80QACZ-61Wc9RvKi0v3qmQ> <xmx:M4dgW_3C-Q7lAngYYbzA-ZS6BMFxW0lscMMAbUHnN2mN5dM56fus7w> <xmx:M4dgW0868AcQAIdazB6fulrEcrQ9yTOB30e0zMcUpdx3UJ3GRThLRg> <xmx:M4dgW4NgkhvRDoP8bGYmBjgnEusp1flqac_HUmS8OHe2qgvb0c5pcw> <xmx:M4dgW1aQq6r0geuN2GuSHkSE2uH_WrZpn-i9d3ETADE_nBi-IjJHgg>
X-ME-Sender: <xms:M4dgW-sXU8-ZPHRgSjLl9ixwjjHqEdodXdBa_huvfSL962juGHmVdQ>
Received: from rtp-alcoop-nitro2.cisco.com (unknown [173.38.117.90]) by mail.messagingengine.com (Postfix) with ESMTPA id A17A8E455F; Tue, 31 Jul 2018 11:58:42 -0400 (EDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <c53a8e8f-7873-3c5a-aa6f-3e0a896c9a88@nostrum.com>
Date: Tue, 31 Jul 2018 11:58:41 -0400
Cc: General Area Review Team <gen-art@ietf.org>, draft-ietf-oauth-device-flow.all@ietf.org, oauth@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <CB9FD96F-EED3-4D09-B744-B576052D52CE@cooperw.in>
References: <152873404689.2672.12557627140070509936@ietfa.amsl.com> <c53a8e8f-7873-3c5a-aa6f-3e0a896c9a88@nostrum.com>
To: Robert Sparks <rjsparks@nostrum.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/X6G5hx14YjnDf-TVAh3pczPcY3w>
Subject: Re: [OAUTH-WG] [Gen-art] Genart last call review of draft-ietf-oauth-device-flow-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 15:58:47 -0000

Robert, thanks for your review. I have pointed to it in my No Objection =
ballot.

Alissa

> On Jul 20, 2018, at 1:37 PM, Robert Sparks <rjsparks@nostrum.com> =
wrote:
>=20
> As far as I can tell, there has been no response to this. The document =
revision just updated a reference to reflect an rfc having been =
published.
>=20
> Apologies if I missed a response.
>=20
> RjS
>=20
>=20
> On 6/11/18 12:20 PM, Robert Sparks wrote:
>> Reviewer: Robert Sparks
>> Review result: Ready with Nits
>>=20
>> I am the assigned Gen-ART reviewer for this draft. The General Area
>> Review Team (Gen-ART) reviews all IETF documents being processed
>> by the IESG for the IETF Chair.  Please treat these comments just
>> like any other last call comments.
>>=20
>> For more information, please see the FAQ at
>>=20
>> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
>>=20
>> Document: draft-ietf-oauth-device-flow-10
>> Reviewer: Robert Sparks
>> Review Date: 2018-06-11
>> IETF LC End Date: 2018-06-12
>> IESG Telechat date: Not scheduled for a telechat
>>=20
>> Summary: Ready for publication as a Proposed Standard RFC, but with =
nits to
>> consider
>>=20
>> Nits/editorial comments:
>>=20
>> In 3.5 "the client MUST use a reasonable default polling interval" is =
not
>> testable. Who determines "reasonable"? At the very least, you should =
add some
>> text about how to determine what "reasonable" is for a given device, =
and add
>> some text that says don't poll faster than earlier responses limited =
you to.
>> For example, if the response at step B in the introductory diagram =
had an
>> explicit interval of 15, but a slow-down response to an E message =
didn't have
>> an explicit interval, you don't want them to default to, say 5 =
seconds (because
>> that's what the example in section 3.2 said, so it must be =
reasonable).
>>=20
>> In 3.3, you say the device_code MUST NOT be displayed or =
communicated. Is there
>> a security property that's lost if there is? Or is this just saying =
"Don't
>> waste space or the user's time"?
>>=20
>> The last paragraph of section 6.1 feels like a recipe for false =
positives, and
>> for bug-entrenched code. Please reconsider it.
>>=20
>> You need line-folding in the example in section 3.2
>>=20
>>=20
>> _______________________________________________
>> Gen-art mailing list
>> Gen-art@ietf.org
>> https://www.ietf.org/mailman/listinfo/gen-art
>=20
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From nobody Tue Jul 31 09:07:11 2018
Return-Path: <wdenniss@google.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54CE0130DD9 for <oauth@ietfa.amsl.com>; Tue, 31 Jul 2018 09:07:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.61
X-Spam-Level: 
X-Spam-Status: No, score=-15.61 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7ApO4L9dFVk5 for <oauth@ietfa.amsl.com>; Tue, 31 Jul 2018 09:07:02 -0700 (PDT)
Received: from mail-ua0-x244.google.com (mail-ua0-x244.google.com [IPv6:2607:f8b0:400c:c08::244]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B2DA130E35 for <oauth@ietf.org>; Tue, 31 Jul 2018 09:07:00 -0700 (PDT)
Received: by mail-ua0-x244.google.com with SMTP id g18-v6so10633830uam.6 for <oauth@ietf.org>; Tue, 31 Jul 2018 09:07:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=MR7ePojU1jZPeHSe3+23Pr4XUEbGzgzlyJevr3CmgtY=; b=LLwG3ie8RS17CAPEBj/1DrNM35ep1+Zd1RoCAmLIDdOv2wRrk9c95DSgjNKVud8fVy kLVujns8O0y5r8u10sHlmdnZEw+fyQfBKgcbod/g6VXqU3KkaBGxo1HZZWfN6fmbxoHB xMAr/UkdKlSdde74u5oflPEh8JN9sPwUd77ABUtubhN1ZUJA6BeWQ68XJHDxN2Ozlqcf MmSE1el+cBLH68YaUMK7kHNdYz3i8xI0+wIXdSsNP4Txug7Op5ILw88+hDmJQHEECIEy Wi2upC2TQahtslY55UUtTyU4gYKkL0FV695e8T6yVUnuwJUOAs2GBVurkxTqhO1cammC Y9iQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=MR7ePojU1jZPeHSe3+23Pr4XUEbGzgzlyJevr3CmgtY=; b=r1uFBMuvEkV7Dvd7q0baW2OICQ6FPVQCKu5+MzKb0u5bCKqhez3xmkS3L4DEPefK7J dE6I+NzRstlb9eojwBuemusXzd9xZ6idIdb5AOgh/GtdIiM6uGCZs+tPoTbgxmcRlw8V AW51vAMRR5hNF9M+lZ5PgDGs8s2JmVaF9MomVA3BBEQHVhLt7nN3whIQv44V1rZV5u8+ FF+yVTgqAn+sQd9PZ7mb7chBg2QhSgrKlpuVXD3zfUGsOxc8uB9qPxyT5LCQgiLk5kPE gHvPMAm16mKr6/j9QkRSH8wn2enB8a0lrNhIiA5oPA8QxXC2ay5erxKeL1M2mckQ+Y4g 58Fg==
X-Gm-Message-State: AOUpUlFHxUcRmkQuA0R6XePQBNWDqjbiw1oqdTwiQ+afNZgIurY/FsNq YiOAg8UE2ZYlhY43lddNpxLBNI7Drcf6mSu0Khe0UQ==
X-Google-Smtp-Source: AAOMgpdmGUHtjX/Ug6kaLO1oCtRPCEw2sadeHfIuCZVIHXb5qmD8pkB2LMUeBKr3Td5Iy8QcsZL33WMO5wDxHTXeRb4=
X-Received: by 2002:ab0:4987:: with SMTP id e7-v6mr15859373uad.198.1533053218673;  Tue, 31 Jul 2018 09:06:58 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ab0:185a:0:0:0:0:0 with HTTP; Tue, 31 Jul 2018 09:06:38 -0700 (PDT)
In-Reply-To: <CB9FD96F-EED3-4D09-B744-B576052D52CE@cooperw.in>
References: <152873404689.2672.12557627140070509936@ietfa.amsl.com> <c53a8e8f-7873-3c5a-aa6f-3e0a896c9a88@nostrum.com> <CB9FD96F-EED3-4D09-B744-B576052D52CE@cooperw.in>
From: William Denniss <wdenniss@google.com>
Date: Tue, 31 Jul 2018 09:06:38 -0700
Message-ID: <CAAP42hDOcViyK6=faz+azP_E680T3ozS5bOLrjooCy1dKZfg4w@mail.gmail.com>
To: Alissa Cooper <alissa@cooperw.in>
Cc: Robert Sparks <rjsparks@nostrum.com>, General Area Review Team <gen-art@ietf.org>,  draft-ietf-oauth-device-flow.all@ietf.org, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000085dcaa05724dc42d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/WpJ3QtInBkYyJ1PIEoreabFNOi4>
Subject: Re: [OAUTH-WG] [Gen-art] Genart last call review of draft-ietf-oauth-device-flow-10
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 16:07:05 -0000

--00000000000085dcaa05724dc42d
Content-Type: text/plain; charset="UTF-8"

Thank you Robert, and Alissa, we really appreciate you feedback. My
co-authors and I are processing yours and all the feedback received so far.
We'll reply to your points in the coming days.


On Tue, Jul 31, 2018 at 8:58 AM, Alissa Cooper <alissa@cooperw.in> wrote:

> Robert, thanks for your review. I have pointed to it in my No Objection
> ballot.
>
> Alissa
>
> > On Jul 20, 2018, at 1:37 PM, Robert Sparks <rjsparks@nostrum.com> wrote:
> >
> > As far as I can tell, there has been no response to this. The document
> revision just updated a reference to reflect an rfc having been published.
> >
> > Apologies if I missed a response.
> >
> > RjS
> >
> >
> > On 6/11/18 12:20 PM, Robert Sparks wrote:
> >> Reviewer: Robert Sparks
> >> Review result: Ready with Nits
> >>
> >> I am the assigned Gen-ART reviewer for this draft. The General Area
> >> Review Team (Gen-ART) reviews all IETF documents being processed
> >> by the IESG for the IETF Chair.  Please treat these comments just
> >> like any other last call comments.
> >>
> >> For more information, please see the FAQ at
> >>
> >> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> >>
> >> Document: draft-ietf-oauth-device-flow-10
> >> Reviewer: Robert Sparks
> >> Review Date: 2018-06-11
> >> IETF LC End Date: 2018-06-12
> >> IESG Telechat date: Not scheduled for a telechat
> >>
> >> Summary: Ready for publication as a Proposed Standard RFC, but with
> nits to
> >> consider
> >>
> >> Nits/editorial comments:
> >>
> >> In 3.5 "the client MUST use a reasonable default polling interval" is
> not
> >> testable. Who determines "reasonable"? At the very least, you should
> add some
> >> text about how to determine what "reasonable" is for a given device,
> and add
> >> some text that says don't poll faster than earlier responses limited
> you to.
> >> For example, if the response at step B in the introductory diagram had
> an
> >> explicit interval of 15, but a slow-down response to an E message
> didn't have
> >> an explicit interval, you don't want them to default to, say 5 seconds
> (because
> >> that's what the example in section 3.2 said, so it must be reasonable).
> >>
> >> In 3.3, you say the device_code MUST NOT be displayed or communicated.
> Is there
> >> a security property that's lost if there is? Or is this just saying
> "Don't
> >> waste space or the user's time"?
> >>
> >> The last paragraph of section 6.1 feels like a recipe for false
> positives, and
> >> for bug-entrenched code. Please reconsider it.
> >>
> >> You need line-folding in the example in section 3.2
> >>
> >>
> >> _______________________________________________
> >> Gen-art mailing list
> >> Gen-art@ietf.org
> >> https://www.ietf.org/mailman/listinfo/gen-art
> >
> > _______________________________________________
> > Gen-art mailing list
> > Gen-art@ietf.org
> > https://www.ietf.org/mailman/listinfo/gen-art
>
>

--00000000000085dcaa05724dc42d
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thank you Robert, and Alissa, we really appreciate you fee=
dback. My co-authors and I are processing yours and all the feedback receiv=
ed so far. We&#39;ll reply to your points in the coming days.<div><br></div=
></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Tue, Ju=
l 31, 2018 at 8:58 AM, Alissa Cooper <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:alissa@cooperw.in" target=3D"_blank">alissa@cooperw.in</a>&gt;</span> wro=
te:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-=
left:1px #ccc solid;padding-left:1ex">Robert, thanks for your review. I hav=
e pointed to it in my No Objection ballot.<br>
<span class=3D"HOEnZb"><font color=3D"#888888"><br>
Alissa<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
&gt; On Jul 20, 2018, at 1:37 PM, Robert Sparks &lt;<a href=3D"mailto:rjspa=
rks@nostrum.com">rjsparks@nostrum.com</a>&gt; wrote:<br>
&gt; <br>
&gt; As far as I can tell, there has been no response to this. The document=
 revision just updated a reference to reflect an rfc having been published.=
<br>
&gt; <br>
&gt; Apologies if I missed a response.<br>
&gt; <br>
&gt; RjS<br>
&gt; <br>
&gt; <br>
&gt; On 6/11/18 12:20 PM, Robert Sparks wrote:<br>
&gt;&gt; Reviewer: Robert Sparks<br>
&gt;&gt; Review result: Ready with Nits<br>
&gt;&gt; <br>
&gt;&gt; I am the assigned Gen-ART reviewer for this draft. The General Are=
a<br>
&gt;&gt; Review Team (Gen-ART) reviews all IETF documents being processed<b=
r>
&gt;&gt; by the IESG for the IETF Chair.=C2=A0 Please treat these comments =
just<br>
&gt;&gt; like any other last call comments.<br>
&gt;&gt; <br>
&gt;&gt; For more information, please see the FAQ at<br>
&gt;&gt; <br>
&gt;&gt; &lt;<a href=3D"https://trac.ietf.org/trac/gen/wiki/GenArtfaq" rel=
=3D"noreferrer" target=3D"_blank">https://trac.ietf.org/trac/<wbr>gen/wiki/=
GenArtfaq</a>&gt;.<br>
&gt;&gt; <br>
&gt;&gt; Document: draft-ietf-oauth-device-flow-<wbr>10<br>
&gt;&gt; Reviewer: Robert Sparks<br>
&gt;&gt; Review Date: 2018-06-11<br>
&gt;&gt; IETF LC End Date: 2018-06-12<br>
&gt;&gt; IESG Telechat date: Not scheduled for a telechat<br>
&gt;&gt; <br>
&gt;&gt; Summary: Ready for publication as a Proposed Standard RFC, but wit=
h nits to<br>
&gt;&gt; consider<br>
&gt;&gt; <br>
&gt;&gt; Nits/editorial comments:<br>
&gt;&gt; <br>
&gt;&gt; In 3.5 &quot;the client MUST use a reasonable default polling inte=
rval&quot; is not<br>
&gt;&gt; testable. Who determines &quot;reasonable&quot;? At the very least=
, you should add some<br>
&gt;&gt; text about how to determine what &quot;reasonable&quot; is for a g=
iven device, and add<br>
&gt;&gt; some text that says don&#39;t poll faster than earlier responses l=
imited you to.<br>
&gt;&gt; For example, if the response at step B in the introductory diagram=
 had an<br>
&gt;&gt; explicit interval of 15, but a slow-down response to an E message =
didn&#39;t have<br>
&gt;&gt; an explicit interval, you don&#39;t want them to default to, say 5=
 seconds (because<br>
&gt;&gt; that&#39;s what the example in section 3.2 said, so it must be rea=
sonable).<br>
&gt;&gt; <br>
&gt;&gt; In 3.3, you say the device_code MUST NOT be displayed or communica=
ted. Is there<br>
&gt;&gt; a security property that&#39;s lost if there is? Or is this just s=
aying &quot;Don&#39;t<br>
&gt;&gt; waste space or the user&#39;s time&quot;?<br>
&gt;&gt; <br>
&gt;&gt; The last paragraph of section 6.1 feels like a recipe for false po=
sitives, and<br>
&gt;&gt; for bug-entrenched code. Please reconsider it.<br>
&gt;&gt; <br>
&gt;&gt; You need line-folding in the example in section 3.2<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt; Gen-art mailing list<br>
&gt;&gt; <a href=3D"mailto:Gen-art@ietf.org">Gen-art@ietf.org</a><br>
&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/gen-art" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/gen=
-art</a><br>
&gt; <br>
&gt; ______________________________<wbr>_________________<br>
&gt; Gen-art mailing list<br>
&gt; <a href=3D"mailto:Gen-art@ietf.org">Gen-art@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/gen-art" rel=3D"noref=
errer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/gen-art=
</a><br>
<br>
</div></div></blockquote></div><br></div>

--00000000000085dcaa05724dc42d--


From nobody Tue Jul 31 23:21:19 2018
Return-Path: <wangzitao@huawei.com>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 53D3C130FB2; Tue, 31 Jul 2018 23:21:10 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Zitao Wang <wangzitao@huawei.com>
To: <ops-dir@ietf.org>
Cc: draft-ietf-oauth-token-exchange.all@ietf.org, ietf@ietf.org, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.83.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153310447029.3248.454015280311920642@ietfa.amsl.com>
Date: Tue, 31 Jul 2018 23:21:10 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/FUQOjzl50xBXKRNYlgRM8s4DXBA>
Subject: [OAUTH-WG] Opsdir last call review of draft-ietf-oauth-token-exchange-14
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.27
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Aug 2018 06:21:10 -0000

Reviewer: Zitao Wang
Review result: Ready

I have reviewed this document as part of the Operational directorateâ€™s ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs should
treat these comments just like any other last call comments.

Document reviewed: draft-ietf-oauth-token-exchange-14

Summary:

This specification defines a protocol for an HTTP- and JSON- based  Security
Token Service (STS) by defining how to request and obtain  security tokens from
OAuth 2.0 authorization servers, including security tokens employing
impersonation and delegation.


