Return-Path: <jim@manicode.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 48EE91B331F
 for <oauth@ietfa.amsl.com>; Tue, 16 Feb 2016 03:05:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id rrogKX2yr3yD for <oauth@ietfa.amsl.com>;
 Tue, 16 Feb 2016 03:05:14 -0800 (PST)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com
 [IPv6:2607:f8b0:400e:c03::231])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 018411B3323
 for <oauth@ietf.org>; Tue, 16 Feb 2016 03:05:13 -0800 (PST)
Received: by mail-pa0-x231.google.com with SMTP id fy10so62218441pac.1
 for <oauth@ietf.org>; Tue, 16 Feb 2016 03:05:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=manicode-com.20150623.gappssmtp.com; s=20150623;
 h=content-type:mime-version:subject:from:in-reply-to:date:cc
 :content-transfer-encoding:message-id:references:to;
 bh=NS+WTcfAno12/hbp8sKgBmEHO1GakBNjM9UzD8SBdMY=;
 b=AdGHy1RCgyHAzy5+KWwDUmg19XWmsu5OiuI7wiu0T8bT2SqrXPfKb3sX4x0LfgLIgM
 Rz4DJJNpfnGeZQwgEuq1dCG3T3BjCO7BXjXBABXwJzd0veXNV+Ktd3FesrF23g0Z9woV
 c1rAN1I/MCw53WknUqVxaJCQ1EOaoNWYoe5qIQVDb30p/BI7xanzS/xQXCWolPQK4Msj
 VKTud8O9hEHtOJdyl0vSBa0D//Pjo4LtR7ySv17hA9gyJLTqU+Qt0P5+ydXgy9NrPyk5
 uqYvEcrQAX2Mr9q4Daio7WyGaea2yFDulYfoKfqZfopxi8xSEG95G3RkuVr2UjWrQ7/K
 JSig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:content-type:mime-version:subject:from
 :in-reply-to:date:cc:content-transfer-encoding:message-id:references
 :to; bh=NS+WTcfAno12/hbp8sKgBmEHO1GakBNjM9UzD8SBdMY=;
 b=K24UGvEvuIgh3I+7QA2foNVLlU3i03wslCuMkTltkw9A+1cOmrfKDoUH1qfazCRpyh
 kg+O1esgLoqTWMwoW9csdOfpbFqIPu0wCjB+5J7uyDVABT+my82EDTI90niAIdNf49xs
 vC3pOgnRbMGPcM0hEsyoyCeMXMFoN3MtWQezJwmQ8N6pXrt5dOhLVGJYco4SE5EqHI2b
 cyA+jkuH6yvE6zAISVLITOi7QmiEte6bi/yeo40p72XLnbtIAXwZj/WL7oRncUuzCspz
 npDw/+hzcwt4/hswdfMpZ8RWRWsXno2R374jJ2elEIMy2Ze/9g5MgDorC7tKdJHHaGHY
 vBVg==
X-Gm-Message-State: AG10YORz5Gl8qvkgoFDUSuFO/HxAznZtciiBi5rkvpJgz+TGX11aHz4VyZBk9yIfCzhzTrkc
X-Received: by 10.66.220.104 with SMTP id pv8mr29976527pac.140.1455620713467; 
 Tue, 16 Feb 2016 03:05:13 -0800 (PST)
Received: from [10.126.115.111] (mobile-166-176-59-192.mycingular.net.
 [166.176.59.192])
 by smtp.gmail.com with ESMTPSA id t12sm44937750pfa.54.2016.02.16.03.05.08
 (version=TLSv1/SSLv3 cipher=OTHER);
 Tue, 16 Feb 2016 03:05:11 -0800 (PST)
Content-Type: multipart/alternative;
 boundary=Apple-Mail-53AA9D07-0964-4ABB-90D3-EA38F0D6F805
Mime-Version: 1.0 (1.0)
From: Jim Manico <jim@manicode.com>
X-Mailer: iPhone Mail (13D15)
In-Reply-To: <138A2A47-E970-428F-8994-BAEB0BEA3894@oracle.com>
Date: Tue, 16 Feb 2016 04:05:07 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <76769768-47AE-4A28-B922-A516EB8F5DDA@manicode.com>
References: <BL2PR03MB433E8ACD3609AF27BB9315CF5AA0@BL2PR03MB433.namprd03.prod.outlook.com>
 <rbrketsshbps53oogq7ovmrw.1455379158417@com.syntomo.email>
 <D1B1293D-2811-466E-8F10-94AA3F55F82F@oracle.com>
 <95DA4443-B94B-4A99-ADE4-4C238DDAB1AD@mit.edu>
 <BL2PR03MB433BDBFABB72EE4CFD14925F5AA0@BL2PR03MB433.namprd03.prod.outlook.com>
 <CAAP42hA=Ja5eaiWKQPzxv2Y38bhVyJt6+KPRSfFkN=VCsCxT_A@mail.gmail.com>
 <56C0816B.8070005@lodderstedt.net>
 <CAAP42hD_uU=Cu-dVk7G6Cz8FdGNNst2Ohw0_F82MsGM1fij_1w@mail.gmail.com>
 <59471C32-2F08-41A1-9744-EC603C6DD97D@manicode.com>
 <138A2A47-E970-428F-8994-BAEB0BEA3894@oracle.com>
To: "Phil Hunt (IDM)" <phil.hunt@oracle.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/RxZNj-ZohNIy59k924m1LZNjgBw>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call for
 Adoption Finalized
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>,
 <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
 <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Feb 2016 11:05:21 -0000


--Apple-Mail-53AA9D07-0964-4ABB-90D3-EA38F0D6F805
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

Phil,

There are four standard session ending controls.

1) Logout
2) Idle session timeout
3) Absolute timeout
4) Forced re-authentication

I think these are still important and tend to not get full attention from th=
e OAuth/OIDC crowd. :)=20

But the OAuth 2 standard in particular is a framework - not a standard - whi=
ch can be implemented many ways, of course.

Aloha,
--
Jim Manico
@Manicode

> On Feb 15, 2016, at 5:34 PM, Phil Hunt (IDM) <phil.hunt@oracle.com> wrote:=

>=20
> In older systems, time based logout is all you have if you aren't assessin=
g risk.=20
>=20
> I would think over time will quickly diminish in its importance (or as bes=
t practice) - at least as the single method for determine a session should e=
nd other than explicit logout.=20
>=20
> Phil
>=20
>> On Feb 15, 2016, at 16:22, Jim Manico <jim@manicode.com> wrote:
>>=20
>> Polite comment, Google in general is pretty "open" about session manageme=
nt in general - long idle timeout and no apparent absolute timeout. For a ba=
nk or other organization that produces high risk software, this is not stand=
ard practice. Re-authentication is a critical security boundary, not prompti=
ng the user for re-authentication credentials is unacceptable in those envir=
onments.
>>=20
>> I may be jumping in out of context, but fair?
>>=20
>> --
>> Jim Manico
>> @Manicode
>> +1 (808) 652-3805
>>=20
>>> On Feb 15, 2016, at 3:36 PM, William Denniss <wdenniss@google.com> wrote=
:
>>>=20
>>> We return 'amr' claims in ID Tokens if "max_age" is requested (per OpenI=
D Connect), e.g.:
>>>=20
>>> https://accounts.google.com/o/oauth2/auth?redirect_uri=3Dhttps%3A%2F%2Fd=
evelopers.google.com%2Foauthplayground&response_type=3Dcode&client_id=3D4074=
08718192.apps.googleusercontent.com&scope=3Dopenid+profile&approval_prompt=3D=
force&access_type=3Doffline&max_age=3D1
>>>=20
>>> The reason we do this is to be explicit about how we are processing the "=
max_age" reauth request, specifically that we don't always prompt the user t=
o reauthenticate directly (but do perform in-session risk analysis).
>>>=20
>>> I can see us potentially using the more generic amr values like "user", a=
nd "mfa" but we will probably avoid very specific ones like "sms" or "otp" t=
o avoid brittle relationships with RPs. That said, I don't object to those b=
eing in the registry, perhaps there is value in some tightly coupled enterpr=
ise configurations.
>>>=20
>>>=20
>>>> On Sun, Feb 14, 2016 at 5:30 AM, Torsten Lodderstedt <torsten@lodderste=
dt.net> wrote:
>>>> Hi Denniss,
>>>>=20
>>>> out of curiosity: Does Google use amr values?=20
>>>>=20
>>>> best regards,
>>>> Torsten.
>>>>=20
>>>>=20
>>>>> Am 14.02.2016 um 02:40 schrieb William       Denniss:
>>>>>=20
>>>>>=20
>>>>> On Sat, Feb 13, 2016 at 12:19 PM, Mike Jones <Michael.Jones@microsoft.=
com> wrote:
>>>>>> It's an acceptable fallback option if the working group decides it do=
esn't want to register the values that are already in production use at the t=
ime we establish the registry. But add William points out, Google is already=
 using some of these values. Microsoft is using some of them. The OpenID MOD=
RNA specs are using some of them. So it seems more efficient to register the=
m at the same time.
>>>>>>=20
>>>>>> That would be my preference.
>>>>>=20
>>>>> +1, it is also my preference to register the current values.
>>>>>=20
>>>>> I don't see any harm in the spec that establishes the registry also se=
eding it with all known values in use at the time of drafting, regardless of=
 the group that originally specified them. Makes the original spec more usef=
ul, and avoids the need to submit each value for consideration separately =E2=
=80=93 they can be all be reviewed at the same time.=20
>>>>>=20
>>>>>=20
>>>>>> From: Justin Richer
>>>>>> Sent: =E2=80=8E2/=E2=80=8E13/=E2=80=8E2016 11:11 AM
>>>>>> To: Phil Hunt
>>>>>>=20
>>>>>> Cc: <oauth@ietf.org>
>>>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call f=
or Adoption Finalized
>>>>>>=20
>>>>>> Can we just do that, then? Seems to be the easiest way to address var=
ious needs and concerns.=20
>>>>>>=20
>>>>>>  =E2=80=94 Justin
>>>>>>=20
>>>>>>> On Feb 13, 2016, at 11:08 AM, Phil Hunt (IDM) <phil.hunt@oracle.com>=
 wrote:
>>>>>>>=20
>>>>>>> Yes
>>>>>>>=20
>>>>>>> Phil
>>>>>>>=20
>>>>>>> On Feb 13, 2016, at 07:59, "torsten@lodderstedt.net" <torsten@lodder=
stedt.net> wrote:
>>>>>>>=20
>>>>>>>> So basically, the RFC could also just establish the new registry an=
d oidf could feel in the values?
>>>>>>>>=20
>>>>>>>> (just trying to understand)
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> -------- Originalnachricht --------
>>>>>>>> Betreff: RE: [OAUTH-WG] Authentication Method Reference Values: Cal=
l for Adoption Finalized
>>>>>>>> Von: Mike Jones <Michael.Jones@microsoft.com>
>>>>>>>> An: torsten@lodderstedt.net,John Bradley <ve7jtb@ve7jtb.com>
>>>>>>>> Cc: oauth@ietf.org
>>>>>>>>=20
>>>>>>>> The context that most people on this thread probably don=E2=80=99t h=
ave is that an IANA registry can only be established by an RFC.  Non-RFC spe=
cifications, such as OpenID specifications, can *register* values in a regis=
try, but they cannot *establish* a registry.  The OpenID Foundation inquired=
 about this with the IETF before OpenID Connect was finalized and learned th=
at its specifications could not establish IANA registries.                  =
                          Otherwise, they would have.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> Instead, RFCs need to be created to establish registries =E2=80=93 e=
ven for values first defined in non-RFC specifications.  This specification i=
s one example of doing this.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>>                                                           -- Mike
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of torsten@lo=
dderstedt.net
>>>>>>>> Sent: Saturday, February 13, 2016 6:37 AM
>>>>>>>> To: John Bradley <ve7jtb@ve7jtb.com>
>>>>>>>> Cc: oauth@ietf.org
>>>>>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Cal=
l for Adoption Finalized
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> We clearly have this problem between oauth and oidc. Just take a lo=
ok at the discovery thread.
>>>>>>>>=20
>>>>>>>> According to you argument I see two options:
>>>>>>>> (1) amr stays an oidc claim, is used in oidc only and the oauth wg j=
ust publishes the registry entries. In this case, the spec should clearly ex=
plain this.
>>>>>>>> (2) amr is of any use in oauth (although it has been invented in oi=
dc) - than define it and motivate it's use in oauth in this spec.
>>>>>>>>=20
>>>>>>>> Right now, I think it creates the impression oauth is for authentic=
ation.
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> -------- Originalnachricht --------
>>>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Cal=
l for Adoption Finalized
>>>>>>>> Von: John Bradley <ve7jtb@ve7jtb.com>
>>>>>>>> An: torsten@lodderstedt.net
>>>>>>>> Cc: roland.hedberg@umu.se,oauth@ietf.org
>>>>>>>>=20
>>>>>>>> This is not a issue between oauth and OIDC.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> This has to do with the registry for JWT being in OAuth.   Many pro=
tocols that use JWT are going to want to register claims. =20
>>>>>>>>=20
>>>>>>>> We can=E2=80=99t ask them to all move the parts of there specs that=
 use JWT to OAuth.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> Perhaps JWT should have been part of JOSE, but that is water under t=
he bridge. =20
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> The OAuth WG is responsible for JWT and it=E2=80=99s registry, and w=
e will need to deal with registering claims. =20
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> I guess that we can tell people that they need to publish the specs=
 defining the claims someplace else, and just do the registry part.
>>>>>>>>=20
>>>>>>>> However doing that will probably not improve interoperability and u=
nderstanding.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> This document defines the claim for JWT in general.  We still have a=
lmost no documentation in the WG about what a JWT access token would contain=
 other than the POP work.
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> John B.
>>>>>>>>=20
>>>>>>>> On Feb 13, 2016, at 9:18 AM, torsten@lodderstedt.net wrote:
>>>>>>>>=20
>>>>>>>> =20
>>>>>>>>=20
>>>>>>>> I basically support adoption of this document. Asserting authentica=
tion methods in access tokens (in this case in JWTS format) is reasonable. W=
e use it to pass information about the authentication performed prior issuin=
g an access token to the _resource_ server.
>>>>>>>>=20
>>>>>>>> What worries me is the back and forth between oauth and oidc. The a=
mr claim is defined in oidc (which sits on top of oauth) but the oauth wg sp=
ecifies the registry? Moreover, the current text does not give a rationale f=
or using amr in context of oauth.
>>>>>>>>=20
>>>>>>>> As a WG we need to find a clear delineation between both protocols,=
 otherwise noone will really understand the difference and when to use what.=
 We create confusion!
>>>>>>>>=20
>>>>>>>> For this particular draft this means to either move amr to oauth or=
 the registry to oidc.
>>>>>>>>=20
>>>>>>>> best regards,=20
>>>>>>>> Torsten.
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> -------- Urspr=C3=BCngliche Nachricht --------
>>>>>>>> Von: Roland Hedberg <roland.hedberg@umu.se>
>>>>>>>> Gesendet: Friday, February 12, 2016 05:45 PM
>>>>>>>> An: oauth@ietf.org
>>>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Cal=
l for Adoption Finalized
>>>>>>>>=20
>>>>>>>> +1
>>>>>>>>=20
>>>>>>>> > 12 feb 2016 kl. 16:58 skrev John Bradley <ve7jtb@ve7jtb.com>:
>>>>>>>> >=20
>>>>>>>> > +1 to adopt this draft.
>>>>>>>> >=20
>>>>>>>> >> On Feb 12, 2016, at 3:07 AM, Mike Jones <Michael.Jones@microsoft=
.com> wrote:
>>>>>>>> >>=20
>>>>>>>> >> Draft -05 incorporates the feedback described below - deleting t=
he request parameter, noting that this spec isn't an encouragement to use OA=
uth 2.0 for authentication without employing appropriate extensions, and no l=
onger requiring a specification for IANA registration.  I believe that it=E2=
=80=99s now ready for working group adoption.
>>>>>>>> >>=20
>>>>>>>> >>                                                           -- Mik=
e
>>>>>>>> >>=20
>>>>>>>> >> -----Original Message-----
>>>>>>>> >> From: OAuth [mailto:oauth-bounces@ietf.org] On Behalf Of Hannes T=
schofenig
>>>>>>>> >> Sent: Thursday, February 4, 2016 11:23 AM
>>>>>>>> >> To: oauth@ietf.org
>>>>>>>> >> Subject: [OAUTH-WG] Authentication Method Reference Values: Call=
 for Adoption Finalized
>>>>>>>> >>=20
>>>>>>>> >> Hi all,
>>>>>>>> >>=20
>>>>>>>> >> On January 19th I posted a call for adoption of the Authenticati=
on Method                                                 Reference Values s=
pecification, see http://www.ietf.org/mail-archive/web/oauth/current/msg1540=
2.html
>>>>>>>> >>=20
>>>>>>>> >> What surprised us is that this work is conceptually very simple:=
 we define new claims and create a registry with new values. Not a big deal b=
ut that's not what the feedback from the Yokohama IETF meeting and the subse=
quent call for adoption on the list shows. The feedback lead to mixed feelin=
gs and it is a bit difficult for Derek and myself to judge consensus.
>>>>>>>> >>=20
>>>>>>>> >> Let me tell you what we see from the comments on the list.
>>>>>>>> >>=20
>>>>>>>> >> In his review at
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15423.html=
 James Manger asks for significant changes. Among other things, he wants to r=
emove one of the claims. He provides a detailed review and actionable items.=

>>>>>>>> >>=20
>>>>>>>> >> William Denniss believes the document is ready for adoption but a=
grees with some of the comments from James. Here is his review:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15426.html=

>>>>>>>> >>=20
>>>>>>>> >> Justin is certainly the reviewer with the strongest opinion. Her=
e is one of his posts:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15457.html=

>>>>>>>> >>=20
>>>>>>>> >> Among all concerns Justin expressed the following one is actuall=
y                                                 actionable IMHO: Justin is=
 worried that                                                 reporting how a=
 person authenticated to an authorization endpoint and encouraging people to=
 use OAuth for authentication is a fine line. He believes that this document=
 leads readers to believe the latter.
>>>>>>>> >>=20
>>>>>>>> >> John agrees with Justin in
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15448.html=
 that we need to make sure that people are not mislead about the intention o=
f the document. John also provides additional comments in this post to the
>>>>>>>> >> list: http://www.ietf.org/mail-archive/web/oauth/current/msg1544=
1.html
>>>>>>>> >> Most of them require more than just editing work. For example, m=
ethods listed are really not useful,
>>>>>>>> >>=20
>>>>>>>> >> Phil agrees with the document adoption but has some remarks abou=
t the registry although he does not propose specific text. His review is her=
e:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15462.html=

>>>>>>>> >>=20
>>>>>>>> >> With my co-chair hat on: I just wanted to clarify that registeri=
ng claims (and values within those claims) is within the scope of the OAuth w=
orking group. We standardized the JWT in this group and we are also chartere=
d to standardize claims, as we are currently doing with various drafts. Not s=
tandardizing JWT in the IETF would have lead to reduced interoperability and=
 less security. I have no doubts that was a wrong decision.
>>>>>>>> >>=20
>>>>>>>> >> In its current form, there is not enough support to have this do=
cument as a WG item.
>>>>>>>> >>=20
>>>>>>>> >> We believe that the document authors should address some of the e=
asier comments and submit a new version. This would allow us to reach out to=
 those who had expressed concerns about the scope of the document to re-eval=
uate their decision. A new draft version should at                          =
                       least address the following issues:
>>>>>>>> >>=20
>>>>>>>> >> * Clarify that this document is not an encouragement for using O=
Auth as an authentication protocol. I believe that this would address some o=
f the concerns raised by Justin and John.
>>>>>>>> >>=20
>>>>>>>> >> * Change the registry policy, which                             =
                    would address one of the comments from James, William, a=
nd Phil.
>>>>>>>> >>=20
>>>>>>>> >> Various other items require discussion since they are more diffi=
cult to address. For example, John noted that he does not like the use of re=
quest parameters. Unfortunately, no alternative is offered. I urge John to p=
rovide an alternative proposal, if there is one. Also, the remark that the v=
alues are meaningless could be countered with an alternative proposal. James=
 wanted to remove the "amr_values" parameter.
>>>>>>>> >> Is this what others want as well?
>>>>>>>> >>=20
>>>>>>>> >> After these items have been addressed we believe that more folks=
 in the group will support the document.
>>>>>>>> >>=20
>>>>>>>> >> Ciao
>>>>>>>> >> Hannes & Derek
>>>>>>>> >>=20
>>>>>>>> >>=20
>>>>>>>> >>=20
>>>>>>>> >> _______________________________________________
>>>>>>>> >> OAuth mailing list
>>>>>>>> >> OAuth@ietf.org
>>>>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> >=20
>>>>>>>> > _______________________________________________
>>>>>>>> > OAuth mailing list
>>>>>>>> > OAuth@ietf.org
>>>>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>=20
>>>>>>>> =E2=80=94 Roland
>>>>>>>>=20
>>>>>>>> =E2=80=9DEverybody should be quiet near a little stream and listen.=
"
>>>>>>>> >=46rom =E2=80=99Open House for Butterflies=E2=80=99 by Ruth Krauss=

>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>=20
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>=20
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>=20
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-53AA9D07-0964-4ABB-90D3-EA38F0D6F805
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Phil,</div><div id=3D"AppleMailSignatu=
re"><br></div><div id=3D"AppleMailSignature">There are four standard session=
 ending controls.</div><div id=3D"AppleMailSignature"><br></div><div id=3D"A=
ppleMailSignature">1) Logout</div><div id=3D"AppleMailSignature">2) Idle ses=
sion timeout</div><div id=3D"AppleMailSignature">3) Absolute timeout</div><d=
iv id=3D"AppleMailSignature">4) Forced re-authentication<br><br>I think thes=
e are still important and tend to not get full attention from the OAuth/OIDC=
 crowd. :)&nbsp;</div><div id=3D"AppleMailSignature"><br></div><div id=3D"Ap=
pleMailSignature">But the OAuth 2 standard in particular is a framework - no=
t a standard - which can be implemented many ways, of course.</div><div id=3D=
"AppleMailSignature"><br></div><div id=3D"AppleMailSignature">Aloha,<br><div=
>--</div><div>Jim Manico</div><div>@Manicode</div></div><div><br>On Feb 15, 2=
016, at 5:34 PM, Phil Hunt (IDM) &lt;<a href=3D"mailto:phil.hunt@oracle.com"=
>phil.hunt@oracle.com</a>&gt; wrote:<br><br></div><blockquote type=3D"cite">=
<div><meta http-equiv=3D"content-type" content=3D"text/html; charset=3Dutf-8=
"><div>In older systems, time based logout is all you have if you aren't ass=
essing risk.&nbsp;</div><div id=3D"AppleMailSignature"><br></div><div id=3D"=
AppleMailSignature">I would think over time will quickly diminish in its imp=
ortance (or as best practice) - at least as the single method for determine a=
 session should end other than explicit logout.&nbsp;</div><div id=3D"AppleM=
ailSignature"><br>Phil</div><div><br>On Feb 15, 2016, at 16:22, Jim Manico &=
lt;<a href=3D"mailto:jim@manicode.com">jim@manicode.com</a>&gt; wrote:<br><b=
r></div><blockquote type=3D"cite"><div><meta http-equiv=3D"content-type" con=
tent=3D"text/html; charset=3Dutf-8"><div>Polite comment, Google in general i=
s pretty "open" about session management in general - long idle timeout and n=
o apparent absolute timeout. For a bank or other organization that produces h=
igh risk software, this is not standard practice. Re-authentication is a cri=
tical security boundary, not prompting the user for re-authentication creden=
tials is unacceptable in those environments.</div><div id=3D"AppleMailSignat=
ure"><br></div><div id=3D"AppleMailSignature">I may be jumping in out of con=
text, but fair?<br><br><div>--</div><div>Jim Manico</div><div>@Manicode</div=
><div>+1 (808) 652-3805</div></div><div><br>On Feb 15, 2016, at 3:36 PM, Wil=
liam Denniss &lt;<a href=3D"mailto:wdenniss@google.com">wdenniss@google.com<=
/a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div><div dir=3D"ltr">=
<div>We return 'amr' claims in ID Tokens if "max_age" is requested (per Open=
ID Connect), e.g.:</div><div><br></div><a href=3D"https://accounts.google.co=
m/o/oauth2/auth?redirect_uri=3Dhttps%3A%2F%2Fdevelopers.google.com%2Foauthpl=
ayground&amp;response_type=3Dcode&amp;client_id=3D407408718192.apps.googleus=
ercontent.com&amp;scope=3Dopenid+profile&amp;approval_prompt=3Dforce&amp;acc=
ess_type=3Doffline&amp;max_age=3D1" target=3D"_blank">https://accounts.googl=
e.com/o/oauth2/auth?redirect_uri=3Dhttps%3A%2F%2Fdevelopers.google.com%2Foau=
thplayground&amp;response_type=3Dcode&amp;client_id=3D407408718192.apps.goog=
leusercontent.com&amp;scope=3Dopenid+profile&amp;approval_prompt=3Dforce&amp=
;access_type=3Doffline&amp;max_age=3D1</a><br><div><br></div><div>The reason=
 we do this is to be explicit about how we are processing the "max_age" reau=
th request, specifically that we don't always prompt the user to reauthentic=
ate directly (but do perform in-session risk analysis).</div><div><br></div>=
<div>I can see us potentially using the more generic amr values like "user",=
 and "mfa" but we will probably avoid very specific ones like "sms" or "otp"=
 to avoid brittle relationships with RPs. That said, I don't object to those=
 being in the registry, perhaps there is value in some tightly coupled enter=
prise configurations.</div><div><br></div><div class=3D"gmail_extra"><br><di=
v class=3D"gmail_quote">On Sun, Feb 14, 2016 at 5:30 AM, Torsten Lodderstedt=
 <span dir=3D"ltr">&lt;<a href=3D"mailto:torsten@lodderstedt.net" target=3D"=
_blank">torsten@lodderstedt.net</a>&gt;</span> wrote:<br><blockquote class=3D=
"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-=
left:1ex">
 =20
   =20
 =20
  <div text=3D"#000000" bgcolor=3D"#FFFFFF">
    Hi Denniss,<br>
    <br>
    out of curiosity: Does Google use amr values? <br>
    <br>
    best regards,<br>
    Torsten.<div><div><br>
    <br>
    <div>Am 14.02.2016 um 02:40 schrieb William
      Denniss:<br>
    </div>
    <blockquote type=3D"cite">
      <div dir=3D"ltr"><br>
        <div class=3D"gmail_extra"><br>
          <div class=3D"gmail_quote">On Sat, Feb 13, 2016 at 12:19 PM,
            Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones=
@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span>=

            wrote:<br>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">
              <div style=3D"word-wrap:break-word">
                <div>
                  <div style=3D"font-family:Calibri,sans-serif;font-size:11p=
t">It's
                    an acceptable fallback option if the working group
                    decides it doesn't want to register the values that
                    are already in production use at the time we
                    establish the registry. But add William points out,
                    Google is already using some of these values.
                    Microsoft is using some of them. The OpenID MODRNA
                    specs are using some of them. So it seems more
                    efficient to register them at the same time.<br>
                    <br>
                    That would be my preference.<br>
                  </div>
                </div>
              </div>
            </blockquote>
            <div><br>
            </div>
            <div>+1, it is also my preference to register the current
              values.</div>
            <div><br>
            </div>
            <div>I don't see any harm in the spec that establishes the
              registry also seeding it with all known values in use at
              the time of drafting, regardless of the group that
              originally specified them. Makes the original spec more
              useful, and avoids the need to submit each value for
              consideration separately =E2=80=93 they can be all be reviewed=
 at
              the same time.&nbsp;</div>
            <div><br>
            </div>
            <div><br>
            </div>
            <blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">
              <div style=3D"word-wrap:break-word">
                <div dir=3D"ltr"><span style=3D"font-family:Calibri,sans-ser=
if;font-size:11pt;font-weight:bold">From:
                  </span><span style=3D"font-family:Calibri,sans-serif;font-=
size:11pt"><a href=3D"mailto:jricher@mit.edu" target=3D"_blank">Justin
                      Richer</a></span><br>
                  <span style=3D"font-family:Calibri,sans-serif;font-size:11=
pt;font-weight:bold">Sent:
                  </span><span style=3D"font-family:Calibri,sans-serif;font-=
size:11pt">=E2=80=8E2/=E2=80=8E13/=E2=80=8E2016
                    11:11 AM</span><br>
                  <span style=3D"font-family:Calibri,sans-serif;font-size:11=
pt;font-weight:bold">To:
                  </span><span style=3D"font-family:Calibri,sans-serif;font-=
size:11pt"><a href=3D"mailto:phil.hunt@oracle.com" target=3D"_blank">Phil
                      Hunt</a></span>
                  <div>
                    <div><br>
                      <span style=3D"font-family:Calibri,sans-serif;font-siz=
e:11pt;font-weight:bold">Cc:
                      </span><span style=3D"font-family:Calibri,sans-serif;f=
ont-size:11pt"><a href=3D"mailto:oauth@ietf.org" target=3D"_blank"></a><a hr=
ef=3D"mailto:oauth@ietf.org" target=3D"_blank">&lt;oauth@ietf.org&gt;</a></s=
pan><br>
                      <span style=3D"font-family:Calibri,sans-serif;font-siz=
e:11pt;font-weight:bold">Subject:
                      </span><span style=3D"font-family:Calibri,sans-serif;f=
ont-size:11pt">Re:
                        [OAUTH-WG] Authentication Method Reference
                        Values: Call for Adoption Finalized</span><br>
                      <br>
                    </div>
                  </div>
                </div>
                <div>
                  <div>
                    <div>Can we just do that, then? Seems to be the
                      easiest way to address various needs and
                      concerns.&nbsp;
                      <div><br>
                      </div>
                      <div>&nbsp;=E2=80=94 Justin</div>
                      <div><br>
                        <div>
                          <blockquote type=3D"cite">
                            <div>On Feb 13, 2016, at 11:08 AM, Phil Hunt
                              (IDM) &lt;<a href=3D"mailto:phil.hunt@oracle.c=
om" target=3D"_blank">phil.hunt@oracle.com</a>&gt;
                              wrote:</div>
                            <br>
                            <div>
                              <div dir=3D"auto">
                                <div>Yes<br>
                                  <br>
                                  Phil</div>
                                <div><br>
                                  On Feb 13, 2016, at 07:59, "<a href=3D"mai=
lto:torsten@lodderstedt.net" target=3D"_blank"></a><a href=3D"mailto:torsten=
@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a>"
                                  &lt;<a href=3D"mailto:torsten@lodderstedt.=
net" target=3D"_blank">torsten@lodderstedt.net</a>&gt;
                                  wrote:<br>
                                  <br>
                                </div>
                                <blockquote type=3D"cite">
                                  <div>
                                    <p dir=3D"ltr">So basically, the RFC
                                      could also just establish the new
                                      registry and oidf could feel in
                                      the values?</p>
                                    <p dir=3D"ltr">(just trying to
                                      understand)</p>
                                    <br>
                                    <br>
                                    -------- Originalnachricht --------<br>
                                    Betreff: RE: [OAUTH-WG]
                                    Authentication Method Reference
                                    Values: Call for Adoption Finalized<br>
                                    Von: Mike Jones &lt;<a href=3D"mailto:Mi=
chael.Jones@microsoft.com" target=3D"_blank"></a><a href=3D"mailto:Michael.J=
ones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<br=
>
                                    An: <a href=3D"mailto:torsten@loddersted=
t.net" target=3D"_blank">torsten@lodderstedt.net</a>,John
                                    Bradley &lt;<a href=3D"mailto:ve7jtb@ve7=
jtb.com" target=3D"_blank"></a><a href=3D"mailto:ve7jtb@ve7jtb.com" target=3D=
"_blank">ve7jtb@ve7jtb.com</a>&gt;<br>
                                    Cc: <a href=3D"mailto:oauth@ietf.org" ta=
rget=3D"_blank">oauth@ietf.org</a><br>
                                    <br>
                                    <div>
                                      <p class=3D"MsoNormal"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">T=
he
                                          context that most people on
                                          this thread probably don=E2=80=99t=

                                          have is that an IANA registry
                                          can only be established by an
                                          RFC.&nbsp; Non-RFC specifications,=

                                          such as OpenID specifications,
                                          can *<b>register</b>* values
                                          in a registry, but they cannot
                                          *<b>establish</b>* a
                                          registry.&nbsp; The OpenID
                                          Foundation inquired about this
                                          with the IETF before OpenID
                                          Connect was finalized and
                                          learned that its
                                          specifications could not
                                          establish IANA registries.&nbsp;
                                          Otherwise, they would have.</span>=
</p>
                                      <p class=3D"MsoNormal"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">&=
nbsp;</span></p>
                                      <p class=3D"MsoNormal"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">I=
nstead,
                                          RFCs need to be created to
                                          establish registries =E2=80=93 eve=
n
                                          for values first defined in
                                          non-RFC specifications.&nbsp; This=

                                          specification is one example
                                          of doing this.</span></p>
                                      <p class=3D"MsoNormal"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">&=
nbsp;</span></p>
                                      <p class=3D"MsoNormal"><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
                                          -- Mike</span></p>
                                      <p class=3D"MsoNormal"><a name=3D"-583=
675157_-1110181406_1953027608__MailEndCompose"><span style=3D"font-size:11.0=
pt;font-family:&quot;Calibri&quot;,sans-serif;color:#002060">&nbsp;</span></=
a></p>
                                      <span></span>
                                      <p class=3D"MsoNormal"><b><span style=3D=
"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif">From:</span></=
b><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif=
">
                                          OAuth [<a href=3D"mailto:oauth-bou=
nces@ietf.org" target=3D"_blank"></a><a href=3D"mailto:oauth-bounces@ietf.or=
g" target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]
                                          <b>On Behalf Of </b><a href=3D"mai=
lto:torsten@lodderstedt.net" target=3D"_blank"></a><a href=3D"mailto:torsten=
@lodderstedt.net" target=3D"_blank">torsten@lodderstedt.net</a><br>
                                          <b>Sent:</b> Saturday,
                                          February 13, 2016 6:37 AM<br>
                                          <b>To:</b> John Bradley &lt;<a hre=
f=3D"mailto:ve7jtb@ve7jtb.com" target=3D"_blank"></a><a href=3D"mailto:ve7jt=
b@ve7jtb.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;<br>
                                          <b>Cc:</b> <a href=3D"mailto:oauth=
@ietf.org" target=3D"_blank"></a><a href=3D"mailto:oauth@ietf.org" target=3D=
"_blank">oauth@ietf.org</a><br>
                                          <b>Subject:</b> Re: [OAUTH-WG]
                                          Authentication Method
                                          Reference Values: Call for
                                          Adoption Finalized</span></p>
                                      <p class=3D"MsoNormal">&nbsp;</p>
                                      <p>We clearly have this problem
                                        between oauth and oidc. Just
                                        take a look at the discovery
                                        thread.</p>
                                      <p>According to you argument I see
                                        two options:<br>
                                        (1) amr stays an oidc claim, is
                                        used in oidc only and the oauth
                                        wg just publishes the registry
                                        entries. In this case, the spec
                                        should clearly explain this.<br>
                                        (2) amr is of any use in oauth
                                        (although it has been invented
                                        in oidc) - than define it and
                                        motivate it's use in oauth in
                                        this spec.
                                      </p>
                                      <p>Right now, I think it creates
                                        the impression oauth is for
                                        authentication.
                                      </p>
                                      <p class=3D"MsoNormal"><br>
                                        <br>
                                        -------- Originalnachricht
                                        --------<br>
                                        Betreff: Re: [OAUTH-WG]
                                        Authentication Method Reference
                                        Values: Call for Adoption
                                        Finalized<br>
                                        Von: John Bradley &lt;<a href=3D"mai=
lto:ve7jtb@ve7jtb.com" target=3D"_blank"></a><a href=3D"mailto:ve7jtb@ve7jtb=
.com" target=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;<br>
                                        An: <a href=3D"mailto:torsten@lodder=
stedt.net" target=3D"_blank">torsten@lodderstedt.net</a><br>
                                        Cc: <a href=3D"mailto:roland.hedberg=
@umu.se,oauth@ietf.org" target=3D"_blank">roland.hedberg@umu.se,oauth@ietf.o=
rg</a><br>
                                        <br>
                                        This is not a issue between
                                        oauth and OIDC.</p>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">This has to
                                          do with the registry for JWT
                                          being in OAuth. &nbsp; Many
                                          protocols that use JWT are
                                          going to want to register
                                          claims. &nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">We can=E2=80=99=
t
                                          ask them to all move the parts
                                          of there specs that use JWT to
                                          OAuth.</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">Perhaps JWT
                                          should have been part of JOSE,
                                          but that is water under the
                                          bridge. &nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">The OAuth
                                          WG is responsible for JWT and
                                          it=E2=80=99s registry, and we will=

                                          need to deal with registering
                                          claims. &nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">I guess
                                          that we can tell people that
                                          they need to publish the specs
                                          defining the claims someplace
                                          else, and just do the registry
                                          part.</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">However
                                          doing that will probably not
                                          improve interoperability and
                                          understanding.</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">This
                                          document defines the claim for
                                          JWT in general.&nbsp; We still hav=
e
                                          almost no documentation in the
                                          WG about what a JWT access
                                          token would contain other than
                                          the POP work.</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                      <div>
                                        <p class=3D"MsoNormal">John B.</p>
                                        <div>
                                          <blockquote style=3D"margin-top:5.=
0pt;margin-bottom:5.0pt">
                                            <div>
                                              <p class=3D"MsoNormal">On
                                                Feb 13, 2016, at 9:18
                                                AM, <a href=3D"mailto:torste=
n@lodderstedt.net" target=3D"_blank">
</a><a href=3D"mailto:torsten@lodderstedt.net" target=3D"_blank">torsten@lod=
derstedt.net</a> wrote:</p>
                                            </div>
                                            <p class=3D"MsoNormal">&nbsp;</p=
>
                                            <div>
                                              <p class=3D"MsoNormal">I
                                                basically support
                                                adoption of this
                                                document. Asserting
                                                authentication methods
                                                in access tokens (in
                                                this case in JWTS
                                                format) is reasonable.
                                                We use it to pass
                                                information about the
                                                authentication performed
                                                prior issuing an access
                                                token to the _resource_
                                                server. </p>
                                              <p class=3D"MsoNormal">What
                                                worries me is the back
                                                and forth between oauth
                                                and oidc. The amr claim
                                                is defined in oidc
                                                (which sits on top of
                                                oauth) but the oauth wg
                                                specifies the registry?
                                                Moreover, the current
                                                text does not give a
                                                rationale for using amr
                                                in context of oauth.</p>
                                              <p class=3D"MsoNormal">As a
                                                WG we need to find a
                                                clear delineation
                                                between both protocols,
                                                otherwise noone will
                                                really understand the
                                                difference and when to
                                                use what. We create
                                                confusion!
                                              </p>
                                              <p class=3D"MsoNormal">For
                                                this particular draft
                                                this means to either
                                                move amr to oauth or the
                                                registry to oidc.
                                              </p>
                                              <p class=3D"MsoNormal">best
                                                regards, <br>
                                                Torsten.</p>
                                              <p class=3D"MsoNormal" style=3D=
"margin-bottom:12.0pt"><br>
                                                <br>
                                                -------- Urspr=C3=BCngliche
                                                Nachricht --------<br>
                                                Von: Roland Hedberg &lt;<a h=
ref=3D"mailto:roland.hedberg@umu.se" target=3D"_blank"></a><a href=3D"mailto=
:roland.hedberg@umu.se" target=3D"_blank">roland.hedberg@umu.se</a>&gt;<br>
                                                Gesendet: Friday,
                                                February 12, 2016 05:45
                                                PM<br>
                                                An: <a href=3D"mailto:oauth@=
ietf.org" target=3D"_blank"></a><a href=3D"mailto:oauth@ietf.org" target=3D"=
_blank">oauth@ietf.org</a><br>
                                                Betreff: Re: [OAUTH-WG]
                                                Authentication Method
                                                Reference Values: Call
                                                for Adoption Finalized</p>
                                              <p class=3D"MsoNormal">+1<br>
                                                <br>
                                                &gt; 12 feb 2016 kl.
                                                16:58 skrev John Bradley
                                                &lt;<a href=3D"mailto:ve7jtb=
@ve7jtb.com" target=3D"_blank"></a><a href=3D"mailto:ve7jtb@ve7jtb.com" targ=
et=3D"_blank">ve7jtb@ve7jtb.com</a>&gt;:<br>
                                                &gt; <br>
                                                &gt; +1 to adopt this
                                                draft.<br>
                                                &gt; <br>
                                                &gt;&gt; On Feb 12,
                                                2016, at 3:07 AM, Mike
                                                Jones &lt;<a href=3D"mailto:=
Michael.Jones@microsoft.com" target=3D"_blank"></a><a href=3D"mailto:Michael=
.Jones@microsoft.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;
                                                wrote:<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Draft -05
                                                incorporates the
                                                feedback described below
                                                - deleting the request
                                                parameter, noting that
                                                this spec isn't an
                                                encouragement to use
                                                OAuth 2.0 for
                                                authentication without
                                                employing appropriate
                                                extensions, and no
                                                longer requiring a
                                                specification for IANA
                                                registration.&nbsp; I believ=
e
                                                that it=E2=80=99s now ready f=
or
                                                working group adoption.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;
                                                -- Mike<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; -----Original
                                                Message-----<br>
                                                &gt;&gt; From: OAuth [<a hre=
f=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank"></a><a href=3D"mailto:=
oauth-bounces@ietf.org" target=3D"_blank">mailto:oauth-bounces@ietf.org</a>]=

                                                On Behalf Of Hannes
                                                Tschofenig<br>
                                                &gt;&gt; Sent: Thursday,
                                                February 4, 2016 11:23
                                                AM<br>
                                                &gt;&gt; To: <a href=3D"mail=
to:oauth@ietf.org" target=3D"_blank"></a><a href=3D"mailto:oauth@ietf.org" t=
arget=3D"_blank">oauth@ietf.org</a><br>
                                                &gt;&gt; Subject:
                                                [OAUTH-WG]
                                                Authentication Method
                                                Reference Values: Call
                                                for Adoption Finalized<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Hi all,<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; On January 19th
                                                I posted a call for
                                                adoption of the
                                                Authentication Method
                                                Reference Values
                                                specification, see
                                                <a href=3D"http://www.ietf.o=
rg/mail-archive/web/oauth/current/msg15402.html" target=3D"_blank">
</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15402.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15402.html</a><br>
                                                &gt;&gt; <br>
                                                &gt;&gt; What surprised
                                                us is that this work is
                                                conceptually very
                                                simple: we define new
                                                claims and create a
                                                registry with new
                                                values. Not a big deal
                                                but that's not what the
                                                feedback from the
                                                Yokohama IETF meeting
                                                and the subsequent call
                                                for adoption on the list
                                                shows. The feedback lead
                                                to mixed feelings and it
                                                is a bit difficult for
                                                Derek and myself to
                                                judge consensus.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Let me tell you
                                                what we see from the
                                                comments on the list.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; In his review
                                                at<br>
                                                &gt;&gt; <a href=3D"http://w=
ww.ietf.org/mail-archive/web/oauth/current/msg15423.html" target=3D"_blank">=

</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15423.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15423.html</a>
                                                James Manger asks for
                                                significant changes.
                                                Among other things, he
                                                wants to remove one of
                                                the claims. He provides
                                                a detailed review and
                                                actionable items.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; William Denniss
                                                believes the document is
                                                ready for adoption but
                                                agrees with some of the
                                                comments from James.
                                                Here is his review:<br>
                                                &gt;&gt; <a href=3D"http://w=
ww.ietf.org/mail-archive/web/oauth/current/msg15426.html" target=3D"_blank">=

</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15426.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15426.html</a><br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Justin is
                                                certainly the reviewer
                                                with the strongest
                                                opinion. Here is one of
                                                his posts:<br>
                                                &gt;&gt; <a href=3D"http://w=
ww.ietf.org/mail-archive/web/oauth/current/msg15457.html" target=3D"_blank">=

</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15457.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15457.html</a><br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Among all
                                                concerns Justin
                                                expressed the following
                                                one is actually
                                                actionable IMHO: Justin
                                                is worried that
                                                reporting how a person
                                                authenticated to an
                                                authorization endpoint
                                                and encouraging people
                                                to use OAuth for
                                                authentication is a fine
                                                line. He believes that
                                                this document leads
                                                readers to believe the
                                                latter.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; John agrees
                                                with Justin in<br>
                                                &gt;&gt; <a href=3D"http://w=
ww.ietf.org/mail-archive/web/oauth/current/msg15448.html" target=3D"_blank">=

</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15448.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15448.html</a>
                                                that we need to make
                                                sure that people are not
                                                mislead about the
                                                intention of the
                                                document. John also
                                                provides additional
                                                comments in this post to
                                                the<br>
                                                &gt;&gt; list: <a href=3D"ht=
tp://www.ietf.org/mail-archive/web/oauth/current/msg15441.html" target=3D"_b=
lank">
</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15441.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15441.html</a><br>
                                                &gt;&gt; Most of them
                                                require more than just
                                                editing work. For
                                                example, methods listed
                                                are really not useful,<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Phil agrees
                                                with the document
                                                adoption but has some
                                                remarks about the
                                                registry although he
                                                does not propose
                                                specific text. His
                                                review is here:<br>
                                                &gt;&gt; <a href=3D"http://w=
ww.ietf.org/mail-archive/web/oauth/current/msg15462.html" target=3D"_blank">=

</a><a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg15462.h=
tml" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g15462.html</a><br>
                                                &gt;&gt; <br>
                                                &gt;&gt; With my
                                                co-chair hat on: I just
                                                wanted to clarify that
                                                registering claims (and
                                                values within those
                                                claims) is within the
                                                scope of the OAuth
                                                working group. We
                                                standardized the JWT in
                                                this group and we are
                                                also chartered to
                                                standardize claims, as
                                                we are currently doing
                                                with various drafts. Not
                                                standardizing JWT in the
                                                IETF would have lead to
                                                reduced interoperability
                                                and less security. I
                                                have no doubts that was
                                                a wrong decision.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; In its current
                                                form, there is not
                                                enough support to have
                                                this document as a WG
                                                item.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; We believe that
                                                the document authors
                                                should address some of
                                                the easier comments and
                                                submit a new version.
                                                This would allow us to
                                                reach out to those who
                                                had expressed concerns
                                                about the scope of the
                                                document to re-evaluate
                                                their decision. A new
                                                draft version should at
                                                least address the
                                                following issues:<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; * Clarify that
                                                this document is not an
                                                encouragement for using
                                                OAuth as an
                                                authentication protocol.
                                                I believe that this
                                                would address some of
                                                the concerns raised by
                                                Justin and John.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; * Change the
                                                registry policy, which
                                                would address one of the
                                                comments from James,
                                                William, and Phil.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Various other
                                                items require discussion
                                                since they are more
                                                difficult to address.
                                                For example, John noted
                                                that he does not like
                                                the use of request
                                                parameters.
                                                Unfortunately, no
                                                alternative is offered.
                                                I urge John to provide
                                                an alternative proposal,
                                                if there is one. Also,
                                                the remark that the
                                                values are meaningless
                                                could be countered with
                                                an alternative proposal.
                                                James wanted to remove
                                                the "amr_values"
                                                parameter.<br>
                                                &gt;&gt; Is this what
                                                others want as well?<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; After these
                                                items have been
                                                addressed we believe
                                                that more folks in the
                                                group will support the
                                                document.<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; Ciao<br>
                                                &gt;&gt; Hannes &amp;
                                                Derek<br>
                                                &gt;&gt; <br>
                                                &gt;&gt; <br>
                                                &gt;&gt; <br>
                                                &gt;&gt;
                                                ____________________________=
___________________<br>
                                                &gt;&gt; OAuth mailing
                                                list<br>
                                                &gt;&gt; <a href=3D"mailto:O=
Auth@ietf.org" target=3D"_blank"></a><a href=3D"mailto:OAuth@ietf.org" targe=
t=3D"_blank">OAuth@ietf.org</a><br>
                                                &gt;&gt; <a href=3D"https://=
www.ietf.org/mailman/listinfo/oauth" target=3D"_blank"></a><a href=3D"https:=
//www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.or=
g/mailman/listinfo/oauth</a><br>
                                                &gt; <br>
                                                &gt;
                                                ____________________________=
___________________<br>
                                                &gt; OAuth mailing list<br>
                                                &gt; <a href=3D"mailto:OAuth=
@ietf.org" target=3D"_blank"></a><a href=3D"mailto:OAuth@ietf.org" target=3D=
"_blank">OAuth@ietf.org</a><br>
                                                &gt; <a href=3D"https://www.=
ietf.org/mailman/listinfo/oauth" target=3D"_blank"></a><a href=3D"https://ww=
w.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/ma=
ilman/listinfo/oauth</a><br>
                                                <br>
                                                =E2=80=94 Roland<br>
                                                <br>
                                                =E2=80=9DEverybody should be=

                                                quiet near a little
                                                stream and listen."<br>
                                                &gt;=46rom =E2=80=99Open Hou=
se for
                                                Butterflies=E2=80=99 by Ruth=

                                                Krauss<br>
                                                <br>
                                                <br>
_______________________________________________<br>
                                                OAuth mailing list<br>
                                                <a href=3D"mailto:OAuth@ietf=
.org" target=3D"_blank"></a><a href=3D"mailto:OAuth@ietf.org" target=3D"_bla=
nk">OAuth@ietf.org</a><br>
                                                <a href=3D"https://www.ietf.=
org/mailman/listinfo/oauth" target=3D"_blank"></a><a href=3D"https://www.iet=
f.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman=
/listinfo/oauth</a></p>
                                              <p class=3D"MsoNormal">_______=
________________________________________<br>
                                                OAuth mailing list<br>
                                                <a href=3D"mailto:OAuth@ietf=
.org" target=3D"_blank"></a><a href=3D"mailto:OAuth@ietf.org" target=3D"_bla=
nk">OAuth@ietf.org</a><br>
                                                <a href=3D"https://www.ietf.=
org/mailman/listinfo/oauth" target=3D"_blank"></a><a href=3D"https://www.iet=
f.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman=
/listinfo/oauth</a></p>
                                            </div>
                                          </blockquote>
                                        </div>
                                        <p class=3D"MsoNormal">&nbsp;</p>
                                      </div>
                                    </div>
                                  </div>
                                </blockquote>
                                <blockquote type=3D"cite">
                                  <div><span>_______________________________=
________________</span><br>
                                    <span>OAuth mailing list</span><br>
                                    <span><a href=3D"mailto:OAuth@ietf.org" t=
arget=3D"_blank">OAuth@ietf.org</a></span><br>
                                    <span><a href=3D"https://www.ietf.org/ma=
ilman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/oauth</a></span><br>
                                  </div>
                                </blockquote>
                              </div>
_______________________________________________<br>
                              OAuth mailing list<br>
                              <a href=3D"mailto:OAuth@ietf.org" target=3D"_b=
lank">OAuth@ietf.org</a><br>
                              <a href=3D"https://www.ietf.org/mailman/listin=
fo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><=
br>
                            </div>
                          </blockquote>
                        </div>
                        <br>
                      </div>
                    </div>
                  </div>
                </div>
              </div>
              <br>
              _______________________________________________<br>
              OAuth mailing list<br>
              <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf=
.org</a><br>
              <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D=
"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</=
a><br>
              <br>
            </blockquote>
          </div>
          <br>
        </div>
      </div>
      <br>
      <fieldset></fieldset>
      <br>
      <pre>_______________________________________________
OAuth mailing list
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </div></div></div>

</blockquote></div><br></div></div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></div></blockquote><blo=
ckquote type=3D"cite"><div><span>___________________________________________=
____</span><br><span>OAuth mailing list</span><br><span><a href=3D"mailto:OA=
uth@ietf.org">OAuth@ietf.org</a></span><br><span><a href=3D"https://www.ietf=
.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>=
</span><br></div></blockquote></div></blockquote></body></html>=

--Apple-Mail-53AA9D07-0964-4ABB-90D3-EA38F0D6F805--

