Re: [OAUTH-WG] treatment of client_id for authentication and identification
Torsten Lodderstedt <torsten@lodderstedt.net> Wed, 27 July 2011 18:02 UTC
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FFCD11E80DF for <oauth@ietfa.amsl.com>; Wed, 27 Jul 2011 11:02:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[AWL=0.144, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yzuWSjPhW9E6 for <oauth@ietfa.amsl.com>; Wed, 27 Jul 2011 11:02:24 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.96]) by ietfa.amsl.com (Postfix) with ESMTP id 6A72411E8075 for <oauth@ietf.org>; Wed, 27 Jul 2011 11:02:23 -0700 (PDT)
Received: from [130.129.17.214] by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Qm8R3-0006ok-F4; Wed, 27 Jul 2011 20:02:22 +0200
Message-ID: <4E3052AA.1020902@lodderstedt.net>
Date: Wed, 27 Jul 2011 14:02:18 -0400
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20110624 Thunderbird/5.0
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <CA559C79.174A7%eran@hueniverse.com>
In-Reply-To: <CA559C79.174A7%eran@hueniverse.com>
Content-Type: multipart/alternative; boundary="------------070507020305020804040005"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] treatment of client_id for authentication and identification
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Jul 2011 18:02:25 -0000
There is no need and I don't intend to "pro-forma" issue client secrets just to conform to some text of the spec. I thought we are beyond that point. The obvious approach would be to use the client_id the same way as it is used on the authz endpoint. regards, Torsten. Am 27.07.2011 13:45, schrieb Eran Hammer-Lahav: > You just issue them a set of password credentials (which can include > an empty or fixed password). There is nothing preventing you from > doing that and once you do, the spec requires them to use those > credentials. > > EHL > > From: Torsten Lodderstedt <torsten@lodderstedt.net > <mailto:torsten@lodderstedt.net>> > Date: Wed, 27 Jul 2011 10:38:36 -0700 > To: Eran Hammer-lahav <eran@hueniverse.com <mailto:eran@hueniverse.com>> > Cc: Brian Campbell <bcampbell@pingidentity.com > <mailto:bcampbell@pingidentity.com>>, oauth <oauth@ietf.org > <mailto:oauth@ietf.org>> > Subject: Re: [OAUTH-WG] treatment of client_id for authentication and > identification > > Am 27.07.2011 12:08, schrieb Eran Hammer-Lahav: >> The way I've set it up in –18 is that the client_id parameter in >> the authorization endpoint is used to identify the client >> registration record. The identifier is described in section >> 2.3. Then in section 2.4.1 the parameter is "extended" for use >> with the token endpoint for client authentication when Basic is >> not available. >> >> So the idea is that the only place you should be using client_id >> is with the authorization endpoint to reference the client >> registration information (needed to lookup the redirection URI). >> I have argued in the past that a future extension to remove the >> need to register clients should make this parameter optional but >> that's outside our current scope. >> >> The token endpoint performs client authentication instead of >> "client identification" using the client identifier as username. > > It can do so for confidential clients only. What about public > clients using e.g. the Resource Owners Password flow? I see the > need to identify them as well. For example, if the authz server > issues a refresh token to such a client there must be a way to > relate this token to a certain client in order to give the user a > chance to revoke this specific token. > > regards, > Torsten. > >> >> Hope this helps. >> >> EHL >> >> >> From: Brian Campbell <bcampbell@pingidentity.com >> <mailto:bcampbell@pingidentity.com>> >> Date: Wed, 27 Jul 2011 04:32:42 -0700 >> To: Eran Hammer-lahav <eran@hueniverse.com >> <mailto:eran@hueniverse.com>> >> Cc: oauth <oauth@ietf.org <mailto:oauth@ietf.org>> >> Subject: Re: [OAUTH-WG] treatment of client_id for authentication >> and identification >> >> Okay, looking at some of those drafts again, I see that now. >> Except >> for -16 they are all pretty similar on client_id back to -10. >> Apparently it was my misunderstanding. Maybe I'm the only >> one who >> doesn't get it but I do think it could be clearer. I'd >> propose some >> text but I'm still not fully sure I understand what is intended. >> >> If a client doesn't have a secret, is client_id a SHOULD NOT, >> a MUST >> NOT or OPTIONAL to be included on token endpoint requests? >> >> Here's a specific question/example to illustrate my continued >> confusion - it would seem like the majority of clients that >> would use >> the Resource Owner Password Credentials grant (although 4.3.2 >> shows >> the use of HTTP Basic) would be "public" clients. How is it >> expected >> that such clients Identify themselves to the AS? The client >> identity, >> even if not something that can be strongly relied on, is >> useful for >> things like presenting a list of access grants to the user for >> revocation. >> >> >> >> http://tools.ietf.org/html/draft-ietf-oauth-v2-20#section-4.3.2 >> >> >> On Tue, Jul 26, 2011 at 12:17 PM, Eran Hammer-Lahav >> <eran@hueniverse.com <mailto:eran@hueniverse.com>> wrote: >> >> Not exactly. >> The current setup was pretty stable up to –15. In –16 I >> tried to clean it up >> by moving the parameter into each token endpoint type >> definition. That >> didn't work and was more confusing so in –17 I reverted >> back to the –15 >> approach. >> What makes this stand out in –20 is that all the examples >> now use HTTP Basic >> instead of the parameters (since we decided to make them >> NOT RECOMMENDED). >> So it feels sudden that client_id is gone, but none of >> this is actually much >> different from –15 on. Client authentication is still >> performed the same >> way, and the role of client_id is just as an alternative >> to using HTTP Basic >> on the token endpoint. >> I think the current text is sufficient, but if you want >> to provide specific >> additions I'm open to it. >> EHL >> From: Brian Campbell <bcampbell@pingidentity.com >> <mailto:bcampbell@pingidentity.com>> >> Date: Tue, 26 Jul 2011 10:16:21 -0700 >> To: Eran Hammer-lahav <eran@hueniverse.com >> <mailto:eran@hueniverse.com>> >> Cc: oauth <oauth@ietf.org <mailto:oauth@ietf.org>> >> Subject: Re: [OAUTH-WG] treatment of client_id for >> authentication and >> identification >> >> I'm probably somewhat biased by having read previous >> version of the >> spec, previous WG list discussions, and my current AS >> implementation >> (which expects client_id) but this seems like a fairly >> big departure >> from what was in -16. I'm okay with the change but feel >> it's wroth >> mentioning that it's likely an incompatible one. >> That aside, I feel like it could use some more explanation in >> draft-ietf-oauth-v2 because, at least to me and hence my >> question, it >> wasn't entirely clear how client_id should be used for >> those cases. >> On Mon, Jul 25, 2011 at 4:18 PM, Eran Hammer-Lahav >> <eran@hueniverse.com <mailto:eran@hueniverse.com>> >> wrote: >> >> The client_id is currently only defined for password >> authentication on the >> token endpoint. If you are using Basic or any other form >> of authentication >> (or no authentication at all), you are not going to use >> the client_id >> parameter. >> >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] treatment of client_id for authenticat… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Torsten Lodderstedt
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Torsten Lodderstedt
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Torsten Lodderstedt
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Torsten Lodderstedt
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Torsten Lodderstedt
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Lu, Hui-Lan (Huilan)
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav
- Re: [OAUTH-WG] treatment of client_id for authent… Brian Campbell
- Re: [OAUTH-WG] treatment of client_id for authent… Lu, Hui-Lan (Huilan)
- Re: [OAUTH-WG] treatment of client_id for authent… Lu, Hui-Lan (Huilan)
- Re: [OAUTH-WG] treatment of client_id for authent… Richer, Justin P.
- Re: [OAUTH-WG] treatment of client_id for authent… Eran Hammer-Lahav