Re: [OAUTH-WG] 'Scope' parameter proposal

Torsten Lodderstedt <torsten@lodderstedt.net> Tue, 27 April 2010 18:49 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9D0563A6B87 for <oauth@core3.amsl.com>; Tue, 27 Apr 2010 11:49:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.669
X-Spam-Level:
X-Spam-Status: No, score=-0.669 tagged_above=-999 required=5 tests=[AWL=-1.020, BAYES_50=0.001, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 524coecLnVk5 for <oauth@core3.amsl.com>; Tue, 27 Apr 2010 11:49:47 -0700 (PDT)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.27]) by core3.amsl.com (Postfix) with ESMTP id 653C128C16F for <oauth@ietf.org>; Tue, 27 Apr 2010 11:49:27 -0700 (PDT)
Received: from p4fff24b2.dip.t-dialin.net ([79.255.36.178] helo=[127.0.0.1]) by smtprelay04.ispgateway.de with esmtpa (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1O6pqG-0004lI-Ie; Tue, 27 Apr 2010 20:49:08 +0200
Message-ID: <4BD731A0.8090105@lodderstedt.net>
Date: Tue, 27 Apr 2010 20:49:04 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: Brian Eaton <beaton@google.com>
References: <C7F1D1FC.32809%eran@hueniverse.com> <0D5497F5-75A7-4A42-9A5E-9C2310162B18@jkemp.net> <90C41DD21FB7C64BB94121FBBC2E723438E5C7F30A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <g2mdaf5b9571004221036j5d6837f6z4d7959d69a3cbb2b@mail.gmail.com> <BB02FD4F-071E-4FF5-B3D0-F8D3FA22FEEE@jkemp.net> <90C41DD21FB7C64BB94121FBBC2E723438E5C7FD26@P3PW5EX1MB01.EX1.SECURESERVER.NET> <h2ldaf5b9571004221235tb844eb6ah623955979526c1b6@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723438E5C7FD4A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <l2idaf5b9571004221350oa0dbeb11ndeb4cb9147407ba9@mail.gmail.com> <255B9BB34FB7D647A506DC292726F6E1125793664B@WSMSG3153V.srv.dir.telstra.com> <w2sdaf5b9571004231705jbff1ae6dz70fd966f091502b3@mail.gmail.com>
In-Reply-To: <w2sdaf5b9571004231705jbff1ae6dz70fd966f091502b3@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Df-Sender: 141509
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 'Scope' parameter proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Apr 2010 18:49:48 -0000

Am 24.04.2010 02:05, schrieb Brian Eaton:
> On Thu, Apr 22, 2010 at 6:11 PM, Manger, James H
> <James.H.Manger@team.telstra.com>  wrote:
>    
>> We mustn't drop advertisements (details in 401 responses).
>> We mustn't drop the goal of a standard for interoperability.
>>      
> I share the goals, I just don't think that a specification is the way
> to get there.  I think working examples in the wild would help
> enormously.
>
>    
>> Defining a scope field in a 401 response is the novel aspect that “might not actually work”. Allowing a 'scope' query parameter in authz URIs is be quite separate.
>>      
> Yeah, I agree with that analysis.
>
> Though I don't know of any providers that are returning authorization
> URLs in 401 responses right now.  That's novel, too.
>
>    

That's novel, yes. But I think no one did it before because there was no 
need to do so. BASIC and DIGEST don't require authorization endpoint 
coordinates. SPNEGO/Kerberos would be a candidate because of its 
architecture, but it uses the standard Kerberos mechanisms (config or 
DNS-based discovery via SRV records).

I think there is a need for a standardized way of authorization server 
discovery. Using the WWW-Authentication header is better than nothing 
from my point of view.

Alternatively, resource servers could publish their supported 
authentication servers via XRD or a similar mechanism. The authorization 
server in turn could publish its endpoints (and capabilities) the same way.

regards,
Torsten.