Re: [OAUTH-WG] user impersonation protocol?
Bill Burke <bburke@redhat.com> Mon, 16 February 2015 15:20 UTC
Return-Path: <bburke@redhat.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7EFB1A1BBB for <oauth@ietfa.amsl.com>; Mon, 16 Feb 2015 07:20:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.911
X-Spam-Level:
X-Spam-Status: No, score=-6.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jQzFMvwkkExo for <oauth@ietfa.amsl.com>; Mon, 16 Feb 2015 07:20:19 -0800 (PST)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF2411A1BFB for <oauth@ietf.org>; Mon, 16 Feb 2015 07:20:19 -0800 (PST)
Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id t1GFKJu6006067 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 16 Feb 2015 10:20:19 -0500
Received: from [10.10.48.231] (vpn-48-231.rdu2.redhat.com [10.10.48.231]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id t1GFKItN016044; Mon, 16 Feb 2015 10:20:18 -0500
Message-ID: <54E20AB2.6070300@redhat.com>
Date: Mon, 16 Feb 2015 10:20:18 -0500
From: Bill Burke <bburke@redhat.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Bill Mills <wmills_92105@yahoo.com>, Justin Richer <jricher@mit.edu>, oauth <oauth@ietf.org>
References: <45p14og69nr08nthyis1k9x1.1424061268466@email.android.com> <790334746.6689293.1424065060482.JavaMail.yahoo@mail.yahoo.com>
In-Reply-To: <790334746.6689293.1424065060482.JavaMail.yahoo@mail.yahoo.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.23
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/3z7-5tHZwsRtZWQFSCf0wNLBx8M>
Subject: Re: [OAUTH-WG] user impersonation protocol?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Feb 2015 15:20:26 -0000
Yeah, I know its risky, but that's the requirement. Was just wondering if there was any protocol work being done around it, so that we could avoid doing a lot of the legwork to make it safe/effective. Currently for us, we need to do this between two separate IDPs, which is where the protocol work comes in...If it was just a single IDP managing everything, then it would just be an internal custom IDP feature. Thanks all. On 2/16/2015 12:37 AM, Bill Mills wrote: > User impersonation is very very risky. The legal aspects of it must be > considered. There's a lot of work to do to make it safe/effective. > > Issuing a scoped token that allows ready only access can work with the > above caveats. Then properties/componenets have to explicitly support > the new scope and do the right thing. > > > On Sunday, February 15, 2015 8:34 PM, Justin Richer <jricher@mit.edu> wrote: > > > For this case you'd want to be very careful about who was able to do > such impersonation, obviously, but it's doable today with custom IdP > behavior. You can simply use OpenID Connect and have the IdP issue an id > token for the target user instead of the "actual" current user account. > > I would also suggest considering adding a custom claim to the id token > to indicate this is taking place. That way you can differentiate where > needed, including in logs. > > -- Justin > > / Sent from my phone / > > > -------- Original message -------- > From: Bill Burke <bburke@redhat.com> > Date:02/15/2015 10:55 PM (GMT-05:00) > To: oauth <oauth@ietf.org> > Cc: > Subject: [OAUTH-WG] user impersonation protocol? > > We have a case where we want to allow a logged in admin user to > impersonate another user so that they can visit differents browser apps > as that user (So they can see everything that the user sees through > their browser). > > Anybody know of any protocol work being done here in the OAuth group or > some other IETF or even Connect effort that would support something like > this? > > Thanks, > > Bill > > -- > Bill Burke > JBoss, a division of Red Hat > http://bill.burkecentral.com > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org <mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth > > -- Bill Burke JBoss, a division of Red Hat http://bill.burkecentral.com
- [OAUTH-WG] user impersonation protocol? Bill Burke
- Re: [OAUTH-WG] user impersonation protocol? Justin Richer
- Re: [OAUTH-WG] user impersonation protocol? Bill Mills
- Re: [OAUTH-WG] user impersonation protocol? Bill Burke
- Re: [OAUTH-WG] user impersonation protocol? Justin Richer
- Re: [OAUTH-WG] user impersonation protocol? Bill Mills
- Re: [OAUTH-WG] user impersonation protocol? William Denniss
- Re: [OAUTH-WG] user impersonation protocol? Bill Mills
- Re: [OAUTH-WG] user impersonation protocol? Mike Jones