Re: [OAUTH-WG] OAuth WG Re-Chartering
Eran Hammer <eran@hueniverse.com> Wed, 14 March 2012 20:36 UTC
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF28E21F884B for <oauth@ietfa.amsl.com>; Wed, 14 Mar 2012 13:36:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.531
X-Spam-Level:
X-Spam-Status: No, score=-2.531 tagged_above=-999 required=5 tests=[AWL=0.068, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7dakcemGHmMf for <oauth@ietfa.amsl.com>; Wed, 14 Mar 2012 13:36:52 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by ietfa.amsl.com (Postfix) with SMTP id 7DFFE21F87EA for <oauth@ietf.org>; Wed, 14 Mar 2012 13:36:51 -0700 (PDT)
Received: (qmail 6857 invoked from network); 14 Mar 2012 20:36:50 -0000
Received: from unknown (HELO p3plex2out02.prod.phx3.secureserver.net) (184.168.131.14) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 14 Mar 2012 20:36:50 -0000
Received: from P3PW5EX1HT004.EX1.SECURESERVER.NET ([72.167.180.46]) by p3plex2out02.prod.phx3.secureserver.net with bizsmtp id lYaK1i00110TkE001YaMve; Wed, 14 Mar 2012 13:34:21 -0700
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.20]) by P3PW5EX1HT004.EX1.SECURESERVER.NET ([72.167.180.134]) with mapi; Wed, 14 Mar 2012 13:33:42 -0700
From: Eran Hammer <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org WG" <oauth@ietf.org>
Date: Wed, 14 Mar 2012 13:33:34 -0700
Thread-Topic: [OAUTH-WG] OAuth WG Re-Chartering
Thread-Index: Ac0CIBOaEwVZ+8xDSkqk1Y4wRm5yvwAAUk8A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723453AFF08971@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <B327D847-B059-41D7-A468-8B8A5DB8BFCE@gmx.net>
In-Reply-To: <B327D847-B059-41D7-A468-8B8A5DB8BFCE@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Mar 2012 20:36:52 -0000
Looks great! Not sure if 'JSON Web Token (JWT)' belongs on this list, but not a big problem. EH > -----Original Message----- > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf > Of Hannes Tschofenig > Sent: Wednesday, March 14, 2012 1:21 PM > To: oauth@ietf.org WG > Subject: [OAUTH-WG] OAuth WG Re-Chartering > > So, here is a proposal: > > ------- > > Web Authorization Protocol (oauth) > > Description of Working Group > > The Web Authorization (OAuth) protocol allows a user to grant > a third-party Web site or application access to the user's protected > resources, without necessarily revealing their long-term credentials, > or even their identity. For example, a photo-sharing site that supports > OAuth could allow its users to use a third-party printing Web site to > print their private pictures, without allowing the printing site to > gain full control of the user's account and without having the user > sharing his or her photo-sharing sites' long-term credential with the > printing site. > > The OAuth protocol suite encompasses > * a procedure for allowing a client to discover a resource server, > * a protocol for obtaining authorization tokens from an authorization > server with the resource owner's consent, > * protocols for presenting these authorization tokens to protected > resources for access to a resource, and > * consequently for sharing data in a security and privacy respective way. > > In April 2010 the OAuth 1.0 specification, documenting pre-IETF work, > was published as an informational document (RFC 5849). With the > completion of OAuth 1.0 the working group started their work on OAuth 2.0 > to incorporate implementation experience with version 1.0, additional > use cases, and various other security, readability, and interoperability > improvements. An extensive security analysis was conducted and the result > is available as a stand-alone document offering guidance for audiences > beyond the community of protocol implementers. > > The working group also developed security schemes for presenting > authorization > tokens to access a protected resource. This led to the publication of > the bearer token as well as the message authentication code (MAC) access > authentication specification. > > OAuth 2.0 added the ability to trade a SAML assertion against an OAUTH > token with > the SAML 2.0 bearer assertion profile. This offers interworking with existing > identity management solutions, in particular SAML based deployments. > > OAuth has enjoyed widespread adoption by the Internet application service > provider > community. To build on this success we aim for nothing more than to make > OAuth the > authorization framework of choice for any Internet protocol. Consequently, > the > ongoing standardization effort within the OAuth working group is focused on > enhancing interoperability of OAuth deployments. While the core OAuth > specification > truly is an important building block it relies on other specifications in order to > claim completeness. Luckily, these components already exist and have been > deployed > on the Internet. Through the IETF standards process they will be improved in > quality and will undergo a rigorous review process. > > Goals and Milestones > > [Editor's Note: Here are the completed items.] > > Done Submit 'OAuth 2.0 Threat Model and Security Considerations' as a > working group item > Done Submit 'HTTP Authentication: MAC Authentication' as a working > group item > Done Submit 'The OAuth 2.0 Protocol: Bearer Tokens' to the IESG for > consideration as a Proposed Standard > Done Submit 'The OAuth 2.0 Authorization Protocol' to the IESG for > consideration as a Proposed Standard > > [Editor's Note: Finishing existing work. Double-check the proposed dates - > are they realistic?] > > Jun. 2012 Submit 'HTTP Authentication: MAC Authentication' to the > IESG for consideration as a Proposed Standard > Apr. 2012 Submit 'SAML 2.0 Bearer Assertion Profiles for OAuth 2.0' to > the IESG for consideration as a Proposed Standard > Apr. 2012 Submit 'OAuth 2.0 Assertion Profile' to the IESG for consideration > as a Proposed Standard > Apr. 2012 Submit 'An IETF URN Sub-Namespace for OAuth' to the IESG for > consideration as a Proposed Standard > May 2012 Submit 'OAuth 2.0 Threat Model and Security Considerations' to > the IESG for consideration as an Informational RFC > > [Editor's Note: New work for the group. 5 items maximum! ] > > Aug. 2012 Submit 'Token Revocation' to the IESG for consideration as a > Proposed Standard > > [Starting point for the work will be http://datatracker.ietf.org/doc/draft- > lodderstedt-oauth-revocation/] > > Nov. 2012 Submit 'JSON Web Token (JWT)' to the IESG for consideration as > a Proposed Standard > > [Starting point for the work will be http://tools.ietf.org/html/draft-jones- > json-web-token] > > Nov. 2012 Submit 'JSON Web Token (JWT) Bearer Token Profiles for OAuth > 2.0' to the IESG for consideration as a Proposed Standard > > [Starting point for the work will be http://tools.ietf.org/html/draft-jones- > oauth-jwt-bearer] > > Jan. 2013 Submit 'OAuth Dynamic Client Registration Protocol' to the IESG > for consideration as a Proposed Standard > > [Starting point for the work will be http://tools.ietf.org/html/draft-hardjono- > oauth-dynreg] > > Sep. 2012 Submit 'OAuth Use Cases' to the IESG for consideration as an > Informational RFC > > [Starting point for the work will be http://tools.ietf.org/html/draft-zeltsan- > oauth-use-cases] > > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] OAuth WG Re-Chartering Hannes Tschofenig
- Re: [OAUTH-WG] OAuth WG Re-Chartering Igor Faynberg
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Richer, Justin P.
- Re: [OAUTH-WG] OAuth WG Re-Chartering Mike Jones
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Richer, Justin P.
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Anthony Nadalin
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Nat Sakimura
- Re: [OAUTH-WG] OAuth WG Re-Chartering Tschofenig, Hannes (NSN - FI/Espoo)
- Re: [OAUTH-WG] OAuth WG Re-Chartering Tschofenig, Hannes (NSN - FI/Espoo)
- Re: [OAUTH-WG] OAuth WG Re-Chartering Paul Madsen
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Paul Madsen
- Re: [OAUTH-WG] OAuth WG Re-Chartering Tschofenig, Hannes (NSN - FI/Espoo)
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Blaine Cook
- Re: [OAUTH-WG] OAuth WG Re-Chartering Tschofenig, Hannes (NSN - FI/Espoo)
- Re: [OAUTH-WG] OAuth WG Re-Chartering Paul Madsen
- Re: [OAUTH-WG] OAuth WG Re-Chartering Richer, Justin P.
- Re: [OAUTH-WG] OAuth WG Re-Chartering Paul Madsen
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Zeltsan, Zachary (Zachary)
- Re: [OAUTH-WG] OAuth WG Re-Chartering Mike Jones
- Re: [OAUTH-WG] OAuth WG Re-Chartering Blaine Cook
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Phil Hunt
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth WG Re-Chartering Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth WG Re-Chartering Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering George Fletcher
- Re: [OAUTH-WG] OAuth WG Re-Chartering Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth WG Re-Chartering Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering George Fletcher
- Re: [OAUTH-WG] OAuth WG Re-Chartering Mike Jones
- Re: [OAUTH-WG] OAuth WG Re-Chartering Phil Hunt
- Re: [OAUTH-WG] OAuth WG Re-Chartering Eran Hammer
- Re: [OAUTH-WG] OAuth WG Re-Chartering John Bradley
- Re: [OAUTH-WG] OAuth WG Re-Chartering Phil Hunt
- Re: [OAUTH-WG] OAuth WG Re-Chartering Mike Jones
- Re: [OAUTH-WG] OAuth WG Re-Chartering Justin Richer
- Re: [OAUTH-WG] OAuth WG Re-Chartering Phil Hunt