Re: [OAUTH-WG] Manual Authorization Codes -- Help/Feedback requested

Shane B Weeden <sweeden@au1.ibm.com> Wed, 11 January 2012 21:25 UTC

Return-Path: <sweeden@au1.ibm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8ABD11E80C2 for <oauth@ietfa.amsl.com>; Wed, 11 Jan 2012 13:25:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NSn1IZXdnZIY for <oauth@ietfa.amsl.com>; Wed, 11 Jan 2012 13:24:59 -0800 (PST)
Received: from e23smtp06.au.ibm.com (e23smtp06.au.ibm.com [202.81.31.148]) by ietfa.amsl.com (Postfix) with ESMTP id 5B4A311E80BB for <oauth@ietf.org>; Wed, 11 Jan 2012 13:24:58 -0800 (PST)
Received: from /spool/local by e23smtp06.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for <oauth@ietf.org> from <sweeden@au1.ibm.com>; Wed, 11 Jan 2012 21:21:52 +1000
Received: from d23relay05.au.ibm.com ([202.81.31.247]) by e23smtp06.au.ibm.com ([202.81.31.212]) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 11 Jan 2012 21:21:49 +1000
Received: from d23av02.au.ibm.com (d23av02.au.ibm.com [9.190.235.138]) by d23relay05.au.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id q0BLKGf93375336; Thu, 12 Jan 2012 08:20:18 +1100
Received: from d23av02.au.ibm.com (loopback [127.0.0.1]) by d23av02.au.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id q0BLOfpe021213; Thu, 12 Jan 2012 08:24:41 +1100
Received: from d23ml004.au.ibm.com (d23ml004.au.ibm.com [9.190.250.23]) by d23av02.au.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id q0BLOfj3021207; Thu, 12 Jan 2012 08:24:41 +1100
In-Reply-To: <4F0DF4C6.9020605@mitre.org>
References: <CAPYhiHZS_jHmxyzV5Bb3FZFYhfCArHE47SwSX-y04kFdc=rVUQ@mail.gmail.com> <4F0C95DE.1000401@mitre.org> <CAPYhiHapSBJiZkbYFyv7eJ-FoPmxi84uU2_w6gqjptH2jCaKyw@mail.gmail.com> <CAPYhiHY-x8fbUyxz9iZutm1rU3W6L3K+Do-QP+=k2z2xdka6+Q@mail.gmail.com> <4F0DF4C6.9020605@mitre.org>
X-KeepSent: C819BEC0:7B1531C7-4A257982:0073D8FB; type=4; name=$KeepSent
To: Gregory Prisament <greg@powercloudsystems.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OFC819BEC0.7B1531C7-ON4A257982.0073D8FB-4A257982.0074B435@au1.ibm.com>
From: Shane B Weeden <sweeden@au1.ibm.com>
Date: Thu, 12 Jan 2012 07:14:43 +1000
X-MIMETrack: Serialize by Router on d23ml004/23/M/IBM(Release 8.5.2FP1HF437 | June 7, 2011) at 12/01/2012 08:28:46
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
x-cbid: 12011111-7014-0000-0000-000000673C2D
Cc: oauth@ietf.org, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] Manual Authorization Codes -- Help/Feedback requested
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jan 2012 21:25:00 -0000

You can also use the authorization code flow with a form of custom (e.g.
manual) delivery of the authorization code from the authorization server to
your client rather than via a redirect.

Some important points about that:
The resource owner must still visit the real authorization endpoint with a
browser to authenticate and grant authorization. The authorization server
can (e.g. for manual delivery) display the azn code on the browser screen.
The resource owner in concert with the authorization server must ensure
secure timely delivery of the authorization code to the client without it
being leaked. The authorization code should have a short lifetime allowing
only sufficient time for the client to get and use it.
The client must exchange the authorization code for an access [and refresh]
token as soon as possible then securely store those for future use.


The safe and secure delivery of the authorization code to the client has
been discussed in several contexts including native mobile apps. Redirects
with custom URI schemes, backchannel delivery via notification services,
and manual delivery such as discussed above are all possible. The core spec
doesn't describe these variants in detail but there is no reason an
authorization server can't implement them.

Regards,
Shane.






From:	Justin Richer <jricher@mitre.org>
To:	Gregory Prisament <greg@powercloudsystems.com>
Cc:	oauth@ietf.org
Date:	12/01/2012 06:50 AM
Subject:	Re: [OAUTH-WG] Manual Authorization Codes -- Help/Feedback
            requested
Sent by:	oauth-bounces@ietf.org



You definitely can do that with an app-specific password using the
resource owner password flow, but if you're already doing OAuth, why
would you want to?

The Device flow fell by the wayside not because people didn't see value
in it -- many do -- but nobody in the group was actively implementing
against it and nobody wanted to pick up editorship of it. David did us
the courtesy of at least capturing those parts of the protocol into a
document so that they wouldn't be lost entirely, but what it really
needs now is an editor to step up and see it through to completion. This
WG is planning to recharter or re-form or something in the near future,
and if there's a champion behind the Device doc (and someone willing to
do the actual work of editing the text), then we'll see it come up again.

  -- Justin

On 01/11/2012 01:49 PM, Gregory Prisament wrote:
> Correction: Last paragraph should read:
> ... Do you think an authorization server could implement
> application-specific passwords, passing it off as the "resource owner
> credentials" grant type...
>
> On Wed, Jan 11, 2012 at 10:47 AM, Gregory Prisament
> <greg@powercloudsystems.com>  wrote:
>> Thanks for the link, that's very similar to what I'm going for.
>>
>> Any idea why people lost interest in the Device Flow?  It seems like a
>> useful option to have!
>>
>> Also, in doing some research, I came across Google's
>> "application-specific passwords", which seem to be another way to
>> solve this problem.
>> http://support.google.com/mail/bin/answer.py?hl=en&answer=1173270
>>
>> Any thoughts on application-specific passwords.  Do you think an
>> authorization server could implement application-specific passwords,
>> passing it off as the "client credentials" grant type.  Would that be
>> in spec?
>>
>> Cheers,
>> Greg
>>
>> On Tue, Jan 10, 2012 at 11:47 AM, Justin Richer<jricher@mitre.org>
wrote:
>>> What you're describing is the Device Flow, which was pulled out of the
main
>>> document a while ago and now sits here, somewhat outdated and unloved:
>>>
>>> http://tools.ietf.org/html/draft-recordon-oauth-v2-device-00
>>>
>>> In this, the app gives the user a short code that they enter into a
URL, do
>>> the authorization there, and get a short code back. It's effectively
the
>>> same as the auth code flow, but it does the dance without HTTP
redirects.
>>>
>>>   -- Justin
>>>
>>>
>>> On 01/10/2012 02:23 PM, Gregory Prisament wrote:
>>>> Hello,
>>>> I am developing a REST API and trying to follow the OAuth 2.0 protocol
>>>> for authentication, and have a few questions for you good folks.
>>>>
>>>> The use case I'm interested in is native applications (such as linux
>>>> command-line programs) that are unable or unwilling to involve a
>>>> user-agent.  In this case, it seems redirection-based flows
>>>> ("Authorization Code" and "Implicit Grant Types") are out!  That
>>>> leaves "Client Credentials" and "Resource Owner Credentials".
>>>>
>>>> "Client Credentials" do not seem appropriate because the client may be
>>>> installed on multiple machines and used by different resource owners.
>>>>
>>>> "Resource Owner Credentials" COULD work, but I'd rather not require
>>>> the resource owner to reveal their username and password.
>>>>
>>>> One solution, which seems reasonable to me, would be to extend OAuth2
>>>> to include another grant type called "Manual Authorization Code".
>>>> Using a web browser, the resource owner would login&    authenticate
>>>>
>>>> with the authorization server (using session log-on, etc).  From there
>>>> they could enter an Application ID and press a button "Generate Manual
>>>> Authorization Code".  The resource owner would then type this Manual
>>>> Authorization Code into the client, and the client could exchange it
>>>> for an Access Token.
>>>>
>>>> But before I go down this route -- writing an extension, etc.. -- I
>>>> wanted the WG's feedback.  It seems there are a few different ways to
>>>> handle this use case and was curious which you think best matches the
>>>> intentions of the OAuth2 spec.
>>>>
>>>> POSSIBLE APPROACHES:
>>>> (1) "Manual Authorization Code" extension.
>>>> See description above.
>>>>
>>>> (2) "Client Credentials" with each resource owner registering a
separate
>>>> client.
>>>> We could achieve a similar effect to (1) by using "Client
>>>> Credentials".  Say the client is a command-line program
>>>> "example-client-cli", which a large number of resource owners have
>>>> downloaded and installed.  Each resource owner would register the
>>>> client with the authorization server and configure their local install
>>>> by telling it the client_id and client_secret.
>>>>
>>>> (3) Something else entirely?
>>>>
>>>> QUESTIONS FOR YOUR:
>>>> (Q1) Has the WG thought about this particular use case ("CLI clients")
>>>> and do you have a recommended authorization approach.
>>>> (Q2) Do Manual Authorization Codes make sense?  Would anyone else find
>>>> it useful to have - if I were to write up an extension document for
>>>> it?
>>>>
>>>>
>>>> Thanks in advanced for you help!
>>>> Cheers,
>>>> Greg Prisament
>>>> Software Architect
>>>> PowerCloud Systems
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>> --
>> Greg Prisament
>> Software Architect
>> PowerCloud Systems
>> greg@powercloudsystems.com
>> mobile: (914) 374-3587
>
>

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth