Re: [OAUTH-WG] popular apps that use appauth?
John Bradley <ve7jtb@ve7jtb.com> Mon, 25 February 2019 11:21 UTC
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8428126C01 for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2019 03:21:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atjWpdU3Q7fm for <oauth@ietfa.amsl.com>; Mon, 25 Feb 2019 03:21:40 -0800 (PST)
Received: from mail-wm1-x334.google.com (mail-wm1-x334.google.com [IPv6:2a00:1450:4864:20::334]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15CE2124C04 for <oauth@ietf.org>; Mon, 25 Feb 2019 03:21:39 -0800 (PST)
Received: by mail-wm1-x334.google.com with SMTP id y15so7688166wma.0 for <oauth@ietf.org>; Mon, 25 Feb 2019 03:21:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zLD+KDbCBMOGQJPTHpt4zbddKPWtxVzBz4AHRM0eBbA=; b=eQwWB1K7dUcO7bvYK+lfQ9PxSaVTVq663StH7b9enFHjzhk9LTxXZScMTo/zEg5Ken 84B7PovUc0oI+Qe8itzkkPcBbRnctx6bpJUEW35pTn3Y2ACW5ZVwQ0l195cvPh4z8O+G d9E1ujrTmbRpIGdJji6QUPTGKl78GXdkYLKTZ18KQSwCdneCBodmqlfg4fH4a3kiOXcR Mdfqf91gz3/cOu0GE+Jl1bud1NMTbbPK5KX+DDoRP+Jj1CezKfC1f1zoFl6/SIuH32Zl AP+zCvJnLbas9y2o663z1i+8nDOnQATHW4Xlzi5SO7xXBQSWALBzU8unt9btYN0zmTRY ZM3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zLD+KDbCBMOGQJPTHpt4zbddKPWtxVzBz4AHRM0eBbA=; b=XOGVAOZcEtaMYTpAYPgaNyk29XNxcHxBRmiV5GQRfECA/v1rarW/b4u1CVnbhSq86o gniXqUt/iUsZlU5kkfMUAa4P57CLIwqcaqTRK8XJ1hw9thes/slqFyi8dRlrvElAjJ2f euu3nP9TycO5yJFl4Y5p43kZKjKRTsAR3TwYapJXHQu3/z5mZoZBZqjL0DsaH+cZCLLt 3b3Jr7dHX+mgra3SQl+fRGNVUzxcS2TYVmRndOoU8V0OFLRWcoomy+gIt10iz/2W3YV4 s0EYJWoI66tVcKcId8H3fVKHphYXdIOpcUw92UQcKyKtsdOrCRZ0jsLD6IT9kbdQv5j/ ZPPg==
X-Gm-Message-State: AHQUAubzR9XYvVZtjRXrHS0f+AI8G/cWhAeAhqc+kI3gzAY6PE+imbt9 V3BW3kXhZrygGBZCHqBcUKlMSsaeMjZ7YcGCqzF4s6JbUwGarg==
X-Google-Smtp-Source: AHgI3IbBvAsrhGsbqgJd/IrFxQZkFukADz545rRBkBPIdmLHS0Y0kX+tGPWWRzBAU7GudfTFSTpaw8yoL4m7NRIEFkc=
X-Received: by 2002:a1c:14e:: with SMTP id 75mr9717774wmb.48.1551093697632; Mon, 25 Feb 2019 03:21:37 -0800 (PST)
MIME-Version: 1.0
References: <67bf27b0-e7d6-4710-ba6e-f46809d60d77@getmailbird.com> <CAO7Ng+v7vCy_cnm00YryN11P5JZngm5R51pBJ5+rQYBF43yz1A@mail.gmail.com> <5dda37c0-e3c5-5e64-347b-25d561072232@ve7jtb.com> <c6f71d94-12f4-4f99-b373-c9f815325da1@getmailbird.com> <CAAP42hCO4m=tmj3omgg+EH2CguF_OVocUzbSwnWRnyb2MQZYVQ@mail.gmail.com> <CCD4D46C-E6EC-4FD2-871B-C969756F9552@alkaline-solutions.com> <CAO_FVe4Aj16zoqg7L+W=cagKY0S5egf8byaHcXTSFM9tnau5iw@mail.gmail.com>
In-Reply-To: <CAO_FVe4Aj16zoqg7L+W=cagKY0S5egf8byaHcXTSFM9tnau5iw@mail.gmail.com>
From: John Bradley <ve7jtb@ve7jtb.com>
Date: Mon, 25 Feb 2019 08:21:25 -0300
Message-ID: <CAANoGh+2b8HF_KCN9Qda8mADOjuCLu2QqhEwu=epu-4shLRzKw@mail.gmail.com>
To: Vittorio Bertocci <Vittorio=40auth0.com@dmarc.ietf.org>
Cc: David Waite <david@alkaline-solutions.com>, William Denniss <wdenniss=40google.com@dmarc.ietf.org>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dc73b20582b62496"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/PxtT3E5pcvQ0je1b2zttmPyDpKM>
Subject: Re: [OAUTH-WG] popular apps that use appauth?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2019 11:21:43 -0000
On Windows Web Authentication broker is a option. https://docs.microsoft.com/en-us/uwp/api/Windows.Security.Authentication.Web I have encouraged Apple to provide a SSO service on OSX. The availability of WebAuthn in browsers may make the platforms rethink some things. John B. On Mon, Feb 25, 2019, 7:48 AM Vittorio Bertocci <Vittorio= 40auth0.com@dmarc.ietf.org> wrote: > Ahh, as John knows this is a big pet peeve for me :) > > Although that's all true on mobile, on desktop things are more > complicated. > > - Using a system browser on the desktop (Linux/Mac/Windows) means that > you don't control the experience (there might be modal dialogs occluding > the browser or any other Z order windows factors; the browser instance > might have already other tabs open; the default browser of any particular > machine can be different; users might need to take steps to get back to the > app; etc) > - Use of loopback adapters is banned by many big enterprises on their > machines > - The big security advantages of the approach on mobile, where apps > are all nicely sandboxed, is not as pronounced in an environment where the > user login session in the machine is the main security boundary (think > keylogger attaching to the main windows events pump, or a debugger - all > stuff not possible on mobile but viable on desktops) > > True, it would be fantastic if desktop OSes would offer system browser > features comparable to what's available on iOS and Android - but today that > doesn't appear to be the case. And the inability to leverage existing > sessions when using embedded views on the desktop is a true pain. But > judging from the behavior of the most popular desktop apps in market > (Office, Slack, Adobe Reader, Visual Studio, even the Google Drive app for > Mac...) losing the ability to access cookies is less of a nuisance for > users than all of the above. And considering that desktop machines usually > have their own way of identifying devices, that is also not much of a > factor for desktop apps. > > The best practice has been discussed for the last 4 years and still all of > the big apps above remain on embedded: it is however telling that the > mobile apps from the same vendors all embraced the system browser approach. > Since the native best practices came out, I have been working with desktop > developers dealing with this cognitive dissonance of the best practice > saying something that is very hard to put in practice. I understand that it > is well intentioned and it is easier to give one single advice for both > mobile and desktop, but while the necessary features and experiences are > lacking on the desktop I am not sure how much of a difference it is making > in that use case. > > > > On Mon, Feb 25, 2019 at 12:59 AM David Waite <david@alkaline-solutions.com> > wrote: > >> >> > On Feb 24, 2019, at 10:43 AM, William Denniss <wdenniss= >> 40google.com@dmarc.ietf.org> wrote: >> > >> > For 1P sign-in, there are several good reasons to go with >> ASWebAuthenticationSession, like syncing the signed-in session with Safari >> and using it if it already exists. >> >> With enterprise 3P, you’ll have to use some web agent for authentication >> pretty much no matter what, and you’ll almost certainly get pressure to use >> ASWebAuthenticationSession, and/or potentially lose deals to competitors >> during product evaluations. It is simply what is required for robust >> integration into a corporate infrastructure. >> >> For 1P on iOS, it depends on the complexity of authentication for first >> party. If you are just doing password and maybe SMS-based challenges, there >> is decent enough native app integration for password sharing and SMS >> keyboard for that to keep conversions high, even with having to >> authenticate twice. >> >> However, if you want to authenticate the device (even pseudonymously with >> session cookies) or do other factors, the authentication is simpler with >> ASWebAuthenticationSession. Which means your life will be easier if you >> have more complex authentication requirements anywhere on your roadmap to >> just start off using ASWebAuthenticationSession. >> >> It is likely that future authentication technologies like WebAuthn will >> not work with an embedded web view. The ability to arbitrarily inject >> javascript means that apps can phish webauthn responses for domains via >> embedded web views. >> >> -DW >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] popular apps that use appauth? Brock Allen
- Re: [OAUTH-WG] popular apps that use appauth? Dominick Baier
- Re: [OAUTH-WG] popular apps that use appauth? David Waite
- Re: [OAUTH-WG] popular apps that use appauth? John Bradley
- Re: [OAUTH-WG] popular apps that use appauth? Brock Allen
- Re: [OAUTH-WG] popular apps that use appauth? William Denniss
- Re: [OAUTH-WG] popular apps that use appauth? David Waite
- Re: [OAUTH-WG] popular apps that use appauth? Vittorio Bertocci
- Re: [OAUTH-WG] popular apps that use appauth? John Bradley
- Re: [OAUTH-WG] popular apps that use appauth? Vittorio Bertocci
- Re: [OAUTH-WG] popular apps that use appauth? Dominick Baier
- Re: [OAUTH-WG] popular apps that use appauth? Vittorio Bertocci
- Re: [OAUTH-WG] popular apps that use appauth? Vittorio Bertocci
- Re: [OAUTH-WG] popular apps that use appauth? John Bradley
- Re: [OAUTH-WG] popular apps that use appauth? David Waite