Re: [OAUTH-WG] Issue: Scope parameter

Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 17 April 2010 12:39 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 731C53A69F6 for <oauth@core3.amsl.com>; Sat, 17 Apr 2010 05:39:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.625
X-Spam-Level:
X-Spam-Status: No, score=-1.625 tagged_above=-999 required=5 tests=[AWL=0.023, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PHXT5yj5+jZk for <oauth@core3.amsl.com>; Sat, 17 Apr 2010 05:39:18 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.18.43]) by core3.amsl.com (Postfix) with ESMTP id 9B9603A69DD for <oauth@ietf.org>; Sat, 17 Apr 2010 05:39:17 -0700 (PDT)
Received: from p4fff3dd0.dip.t-dialin.net ([79.255.61.208] helo=[127.0.0.1]) by smtprelay01.ispgateway.de with esmtpa (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1O37Ia-0005dI-AD; Sat, 17 Apr 2010 14:39:00 +0200
Message-ID: <4BC9ABD8.6070206@lodderstedt.net>
Date: Sat, 17 Apr 2010 14:38:48 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: "Manger, James H" <James.H.Manger@team.telstra.com>
References: <h2o74caaad21004151238w60c3afd3td8dccdd8a7127a4a@mail.gmail.com> <C7ECBC36.32379%eran@hueniverse.com> <191F411E00E19F4E943ECDB6D65C60851691F095@TK5EX14MBXC115.redmond.corp.microsoft.com> <255B9BB34FB7D647A506DC292726F6E1125748109A@WSMSG3153V.srv.dir.telstra.com> <191F411E00E19F4E943ECDB6D65C60851691F5A9@TK5EX14MBXC115.redmond.corp.microsoft.com> <255B9BB34FB7D647A506DC292726F6E11257591D3B@WSMSG3153V.srv.dir.telstra.com> <191F411E00E19F4E943ECDB6D65C60851691F645@TK5EX14MBXC115.redmond.corp.microsoft.com> <255B9BB34FB7D647A506DC292726F6E11257591E3F@WSMSG3153V.srv.dir.telstra.com> <4BC975C4.9040003@lodderstedt.net> <255B9BB34FB7D647A506DC292726F6E1125759234D@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1125759234D@WSMSG3153V.srv.dir.telstra.com>
Content-Type: multipart/alternative; boundary="------------020408070700050507050803"
X-Df-Sender: 141509
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Issue: Scope parameter
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Apr 2010 12:39:19 -0000

Am 17.04.2010 14:30, schrieb Manger, James H:
>
> > authz-uri=http://as.com
> > realm=foo
> >
> > What do you think?
>
> I can’t see any benefit in making the client app combine the realm and 
> authz-uri, over the server just returning an authz-uri with that 
> information already included (in whatever concise form it wants).
>
> Matching realm values allows a client to recognize when the same 
> credential (eg token) can be used. This might preclude realm values 
> differing between Foo and Bar services that can accept the same tokens.
>

How shall the client recognize if the same token can be used for Foo and 
Bar? Realm would be an option-

regards,
Torsten.
>
> -- 
>
> James Manger
>
> *From:* Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
> *Sent:* Saturday, 17 April 2010 6:48 PM
> *To:* Manger, James H
> *Cc:* Justin Smith; OAuth WG
> *Subject:* Re: [OAUTH-WG] Issue: Scope parameter
>
> in a recent discussion, another proposal was to use the realm 
> attribute of the WWW-Authenticate header to indicate the scope
>
> So in your example the header would include two attributes
> authz-uri=http://as.com
> realm=foo
>
> What do you think?
>
> regards,
> Torsten.
>
> Am 16.04.2010 06:43, schrieb Manger, James H:
>
> > So, let’s say there is an Authorization Server available at 
> http://as.com and it protects the http://foo.com and http://bar.com 
> resources.
>
> > A client requests http://foo.com. The foo.com server responds with a 
> WWW-Auth that contains the http://as.com URI. The client then sends an 
> access token request to http://as.com. Is that right?
>
> > If so, then how does http://as.com know that the intended resource is 
> http://foo.com?
>
> Foo.com should point the client at, say, http://as.com/foo/ or 
> http://foo.as.com/ or http://as.com/?scope=foo or 
> http://as.com/?encrypted_resource_id=273648264287642 or whatever it 
> has agreed to with its AS.
>
> The WWW-Auth response from foo.com should not be just http://as.com.
>
> Foo is much better placed to know it shares as.com with Bar than a 
> client is.
>
> --
>
> James Manger
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>