Re: Re: [OAUTH-WG] Last Call: <draft-ietf-oauth-assertions-08.txt> (Assertion Framework for OAuth 2.0) to Proposed Standard

zhou.sujing@zte.com.cn Fri, 14 December 2012 02:56 UTC

Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C23F521F899D; Thu, 13 Dec 2012 18:56:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.675
X-Spam-Level:
X-Spam-Status: No, score=-97.675 tagged_above=-999 required=5 tests=[AWL=-0.302, BAYES_00=-2.599, FRT_FOLLOW2=0.422, HTML_MESSAGE=0.001, J_CHICKENPOX_71=0.6, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3nMc3QRJZd+V; Thu, 13 Dec 2012 18:56:31 -0800 (PST)
Received: from zte.com.cn (mx5.zte.com.cn [63.217.80.70]) by ietfa.amsl.com (Postfix) with ESMTP id 0389D21F8929; Thu, 13 Dec 2012 18:56:31 -0800 (PST)
Received: from zte.com.cn (unknown [192.168.168.119]) by Websense Email Security Gateway with ESMTP id 02B541244005; Fri, 14 Dec 2012 10:58:20 +0800 (CST)
Received: from mse02.zte.com.cn (unknown [10.30.3.21]) by Websense Email Security Gateway with ESMTPS id 12F4F724F17; Fri, 14 Dec 2012 10:45:30 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse02.zte.com.cn with ESMTP id qBE2uBnA046867; Fri, 14 Dec 2012 10:56:11 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <D0292BED-C6D8-4B56-9BBE-6C280F38BC42@salesforce.com>
To: Chuck Mortimore <cmortimore@salesforce.com>
Subject: Re: Re: [OAUTH-WG] Last Call: <draft-ietf-oauth-assertions-08.txt> (Assertion Framework for OAuth 2.0) to Proposed Standard
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OF6AFFEFB0.3752F820-ON48257AD4.000F9DD7-48257AD4.00103FB9@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Fri, 14 Dec 2012 10:55:57 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2012-12-14 10:56:04, Serialize complete at 2012-12-14 10:56:04
Content-Type: multipart/alternative; boundary="=_alternative 00103FB948257AD4_="
X-MAIL: mse02.zte.com.cn qBE2uBnA046867
X-Mailman-Approved-At: Fri, 14 Dec 2012 09:26:49 -0800
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2012 02:56:32 -0000

Yep, could do it soon later. 

Currently, I suggest a modification for 

 "The token service is the assertion issuer; its  role is to fulfill 
requests from clients, which present various 
 credentials, and mint assertions as requested, fill them with appropriate 
information, and sign them."  (in  section 3 )

into 

 "The token service is the assertion issuer, it could be implemented in 
any entity besides client, e.g., Resource Owner, Authorization Server; its 
 role is to fulfill requests from clients, which present various 
credentials, and mint assertions as requested, fill them with  appropriate 
information, and sign them." 



Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 10:44:05:

> Correct.   That said no one has yet profiled it for holder of key
> 
> - cmort
> 
> On Dec 13, 2012, at 6:39 PM, "zhou.sujing@zte.com.cn" 
<zhou.sujing@zte.com.cn
> > wrote:

> 
> Oh, But the description of assertion generation in the document 
> should not be limited by bear assertion, right? 
> 
> 
> Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 10:34:13:
> 
> > You want a holder of key pattern.  The draft touches on it 
> > 
> > 
> >    The protocol parameters and processing rules defined in this 
document
> >    are intended to support a client presenting a bearer assertion to 
an
> >    authorization server.  The use of holder-of-key assertions are not
> >    precluded by this document, but additional protocol details would
> >    need to be specified.
> 
> > 
> > So - if you want this, you should put forth a holder of key 
> > profiling of this draft and see if there are any issues.   The only 
> > profiles we have thus far are saml and jwt bearer assertions. 
> > 
> > 
> > - cmort 
> > 
> > On Dec 13, 2012, at 6:27 PM, "zhou.sujing@zte.com.cn" <zhou.
> sujing@zte.com.cn
> > > wrote:
> 
> > 
> > I am not sure if the following usecase  http://www.ietf.org/mail-
> > archive/web/oauth/current/msg10233.html 
> > could be supported by assertion framework, 
> > We have some discussion in 
> > http://www.ietf.org/mail-archive/web/oauth/current/msg10203.html 
> > http://www.ietf.org/mail-archive/web/oauth/current/msg10198.html 
> > 
> > In my use case or in some other cases, assertions don't need 
> > confidential protection, 
> > basically STS don't have to authenticate a client before issueing 
> > "assertion", if it could be called assertion here. 
> > 
> > Example,I trust my laywer, I may issue an "assertion" stating 
> > delegation in advance, and send to the lawyer when it is needed, 
> > it could be I give the assertion to a false lawyer, but it does not 
> > matter, because the lawyer has to prove he knows some credential 
> > corresponding to his ID, 
> > who is delegated some rights. 
> > 
> > If assertion framework want to support this use case, then 
> > generation of assertion should be relaxed, 
> > otherwise new work is required to support the use case. 
> > 
> > 
> > 
> > Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 10:08:34:
> > 
> > > On Dec 13, 2012, at 4:30 PM, "zhou.sujing@zte.com.cn" <zhou.
> > sujing@zte.com.cn
> > > > wrote:
> > 
> > > 
> > > From the language, I got an impression that assertion is only 
> > > generated by token service after clients presenting some 
credentials, 
> > > there are may be some cases that "assertion" don't need client's 
> > credential. 
> > > e.g., Resource owner as a token service  could generate "assertion" 
> > > to a client he trusts, bu signing a statement that "This delegation 
> > > is given to a client called clinet-id 
> > > for doing something for me". 
> > > 
> > > So how does the STS trust the client?   Presumably if it is trusted 
> > > it has some level of authentication, yes? 
> > > 
> > > -cmort 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 
00:39:03:
> > > 
> > > > The language is simply meant to help illustrate how the framework 
> > > > might be used.   How do you think it will restrict usage?   How 
> > > > could it be improved? 
> > > > 
> > > > -cmort 
> > > > 
> > > > On Dec 12, 2012, at 11:04 PM, <zhou.sujing@zte.com.cn> wrote: 
> > > > 
> > > > 
> > > > In "section 3 
> > > >  The token service is the assertion issuer; its 
> > > >  role is to fulfill requests from clients, which present various 
> > > >  credentials, and mint assertions as requested, fill them with 
> > > >  appropriate information, and sign them." 
> > > > 
> > > > 
> > > > As I understand, an assertion generated by a STS, is done 
flollowing
> > > > thess steps: 
> > > > 1. Client presents credential and requests an assertion 
> > > > 2. STS generates assertion and sends to Client 
> > > > Correct? 
> > > > 
> > > > That may restrict the use cases that this assertion framework 
> > > could support, 
> > > > is it a must? 
> > > > 
> > > > 
> > > > 
> > > > 
> > > > oauth-bounces@ietf.org 写于 2012-12-11 02:33:57:
> > > > 
> > > > > 
> > > > > The IESG has received a request from the Web Authorization 
Protocol WG
> > > > > (oauth) to consider the following document:
> > > > > - 'Assertion Framework for OAuth 2.0'
> > > > >   <draft-ietf-oauth-assertions-08.txt> as Proposed Standard
> > > > > 
> > > > > The IESG plans to make a decision in the next few weeks, and 
solicits
> > > > > final comments on this action. Please send substantive comments 
to the
> > > > > ietf@ietf.org mailing lists by 2012-12-24. Exceptionally, 
> > comments may be
> > > > > sent to iesg@ietf.org instead. In either case, please retain the
> > > > > beginning of the Subject line to allow automated sorting.
> > > > > 
> > > > > Abstract
> > > > > 
> > > > > 
> > > > >    This specification provides a framework for the use of 
assertions
> > > > >    with OAuth 2.0 in the form of a new client 
authenticationmechanism
> > > > >    and a new authorization grant type.  Mechanisms are specified 
for
> > > > >    transporting assertions during interactions with a token 
> endpoint, as
> > > > >    well as general processing rules.
> > > > > 
> > > > >    The intent of this specification is to provide a common 
> framework for
> > > > >    OAuth 2.0 to interwork with other identity systems using 
> assertions,
> > > > >    and to provide alternative client authentication mechanisms.
> > > > > 
> > > > >    Note that this specification only defines abstract 
> message flows and
> > > > >    processing rules.  In order to be implementable, companion
> > > > >    specifications are necessary to provide the corresponding 
concrete
> > > > >    instantiations.
> > > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > The file can be obtained via
> > > > > http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/
> > > > > 
> > > > > IESG discussion can be tracked via
> > > > > 
http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/
> > > > > 
> > > > > 
> > > > > No IPR declarations have been submitted directly on this I-D.
> > > > > 
> > > > > 
> > > > > _______________________________________________
> > > > > OAuth mailing list
> > > > > OAuth@ietf.org
> > > > > https://www.ietf.org/mailman/listinfo/oauth
> > > > _______________________________________________
> > > > OAuth mailing list
> > > > OAuth@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/oauth