Re: Re: [OAUTH-WG] Last Call: <draft-ietf-oauth-assertions-08.txt> (Assertion Framework for OAuth 2.0) to Proposed Standard

zhou.sujing@zte.com.cn Fri, 14 December 2012 02:27 UTC

Return-Path: <zhou.sujing@zte.com.cn>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A91021F8BD2; Thu, 13 Dec 2012 18:27:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.003
X-Spam-Level:
X-Spam-Status: No, score=-98.003 tagged_above=-999 required=5 tests=[AWL=-0.030, BAYES_00=-2.599, FRT_FOLLOW2=0.422, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, MIME_CHARSET_FARAWAY=2.45, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y6bn6MTENeOo; Thu, 13 Dec 2012 18:27:24 -0800 (PST)
Received: from zte.com.cn (mx5.zte.com.cn [63.217.80.70]) by ietfa.amsl.com (Postfix) with ESMTP id 943DF21F8AD2; Thu, 13 Dec 2012 18:27:23 -0800 (PST)
Received: from zte.com.cn (unknown [192.168.168.119]) by Websense Email Security Gateway with ESMTP id 076271243AF0; Fri, 14 Dec 2012 10:29:15 +0800 (CST)
Received: from mse01.zte.com.cn (unknown [10.30.3.20]) by Websense Email Security Gateway with ESMTPS id 00221724CD2; Fri, 14 Dec 2012 10:16:24 +0800 (CST)
Received: from notes_smtp.zte.com.cn ([10.30.1.239]) by mse01.zte.com.cn with ESMTP id qBE2R4ei022614; Fri, 14 Dec 2012 10:27:04 +0800 (GMT-8) (envelope-from zhou.sujing@zte.com.cn)
In-Reply-To: <7CCC0903-4D4C-4F49-A7CA-ECA148935B47@salesforce.com>
To: Chuck Mortimore <cmortimore@salesforce.com>
Subject: Re: Re: [OAUTH-WG] Last Call: <draft-ietf-oauth-assertions-08.txt> (Assertion Framework for OAuth 2.0) to Proposed Standard
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.5.6 March 06, 2007
Message-ID: <OFB336BD6F.D58307B1-ON48257AD4.000C51F0-48257AD4.000D954A@zte.com.cn>
From: zhou.sujing@zte.com.cn
Date: Fri, 14 Dec 2012 10:26:50 +0800
X-MIMETrack: Serialize by Router on notes_smtp/zte_ltd(Release 8.5.3FP1 HF212|May 23, 2012) at 2012-12-14 10:26:57, Serialize complete at 2012-12-14 10:26:57
Content-Type: multipart/alternative; boundary="=_alternative 000D954948257AD4_="
X-MAIL: mse01.zte.com.cn qBE2R4ei022614
X-Mailman-Approved-At: Fri, 14 Dec 2012 09:26:48 -0800
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2012 02:27:25 -0000

I am not sure if the following usecase 
http://www.ietf.org/mail-archive/web/oauth/current/msg10233.html
could be supported by assertion framework,
We have some discussion in 
http://www.ietf.org/mail-archive/web/oauth/current/msg10203.html
http://www.ietf.org/mail-archive/web/oauth/current/msg10198.html 

In my use case or in some other cases, assertions don't need confidential 
protection, 
basically STS don't have to authenticate a client before issueing 
"assertion", if it could be called assertion here.

Example,I trust my laywer, I may issue an "assertion" stating delegation 
in advance, and send to the lawyer when it is needed,
it could be I give the assertion to a false lawyer, but it does not 
matter, because the lawyer has to prove he knows some credential 
corresponding to his ID,
who is delegated some rights.

If assertion framework want to support this use case, then generation of 
assertion should be relaxed,
otherwise new work is required to support the use case.



Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 10:08:34:

> On Dec 13, 2012, at 4:30 PM, "zhou.sujing@zte.com.cn" 
<zhou.sujing@zte.com.cn
> > wrote:

> 
> From the language, I got an impression that assertion is only 
> generated by token service after clients presenting some credentials, 
> there are may be some cases that "assertion" don't need client's 
credential. 
> e.g., Resource owner as a token service  could generate "assertion" 
> to a client he trusts, bu signing a statement that "This delegation 
> is given to a client called clinet-id 
> for doing something for me". 
> 
> So how does the STS trust the client?   Presumably if it is trusted 
> it has some level of authentication, yes?
> 
> -cmort
> 
> 
> 
> 
> 
> Chuck Mortimore <cmortimore@salesforce.com> 写于 2012-12-14 00:39:03:
> 
> > The language is simply meant to help illustrate how the framework 
> > might be used.   How do you think it will restrict usage?   How 
> > could it be improved? 
> > 
> > -cmort 
> > 
> > On Dec 12, 2012, at 11:04 PM, <zhou.sujing@zte.com.cn> wrote: 
> > 
> > 
> > In "section 3 
> >  The token service is the assertion issuer; its 
> >  role is to fulfill requests from clients, which present various 
> >  credentials, and mint assertions as requested, fill them with 
> >  appropriate information, and sign them." 
> > 
> > 
> > As I understand, an assertion generated by a STS, is done flollowing
> > thess steps: 
> > 1. Client presents credential and requests an assertion 
> > 2. STS generates assertion and sends to Client 
> > Correct? 
> > 
> > That may restrict the use cases that this assertion framework 
> could support, 
> > is it a must? 
> > 
> > 
> > 
> > 
> > oauth-bounces@ietf.org 写于 2012-12-11 02:33:57:
> > 
> > > 
> > > The IESG has received a request from the Web Authorization Protocol 
WG
> > > (oauth) to consider the following document:
> > > - 'Assertion Framework for OAuth 2.0'
> > >   <draft-ietf-oauth-assertions-08.txt> as Proposed Standard
> > > 
> > > The IESG plans to make a decision in the next few weeks, and 
solicits
> > > final comments on this action. Please send substantive comments to 
the
> > > ietf@ietf.org mailing lists by 2012-12-24. Exceptionally, comments 
may be
> > > sent to iesg@ietf.org instead. In either case, please retain the
> > > beginning of the Subject line to allow automated sorting.
> > > 
> > > Abstract
> > > 
> > > 
> > >    This specification provides a framework for the use of assertions
> > >    with OAuth 2.0 in the form of a new client authentication 
mechanism
> > >    and a new authorization grant type.  Mechanisms are specified for
> > >    transporting assertions during interactions with a token 
endpoint, as
> > >    well as general processing rules.
> > > 
> > >    The intent of this specification is to provide a common framework 
for
> > >    OAuth 2.0 to interwork with other identity systems using 
assertions,
> > >    and to provide alternative client authentication mechanisms.
> > > 
> > >    Note that this specification only defines abstract message flows 
and
> > >    processing rules.  In order to be implementable, companion
> > >    specifications are necessary to provide the corresponding 
concrete
> > >    instantiations.
> > > 
> > > 
> > > 
> > > 
> > > The file can be obtained via
> > > http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/
> > > 
> > > IESG discussion can be tracked via
> > > http://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/ballot/
> > > 
> > > 
> > > No IPR declarations have been submitted directly on this I-D.
> > > 
> > > 
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth