Re: [OAUTH-WG] OAuth discovery draft?

Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 26 June 2010 06:09 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 57B6F3A635F for <oauth@core3.amsl.com>; Fri, 25 Jun 2010 23:09:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.598
X-Spam-Level:
X-Spam-Status: No, score=-1.598 tagged_above=-999 required=5 tests=[AWL=0.650, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YpnoNgMQK4sm for <oauth@core3.amsl.com>; Fri, 25 Jun 2010 23:09:33 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.14]) by core3.amsl.com (Postfix) with ESMTP id EFA603A67D0 for <oauth@ietf.org>; Fri, 25 Jun 2010 23:09:32 -0700 (PDT)
Received: from [80.187.100.84] (helo=[10.198.192.84]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1OSOa4-0008Oo-MG; Sat, 26 Jun 2010 08:09:34 +0200
References: <7C01E631FF4B654FA1E783F1C0265F8C579C6DC3@TK5EX14MBXC117.redmond.corp.microsoft.com> <C8479A94.363F3%eran@hueniverse.com> <7C01E631FF4B654FA1E783F1C0265F8C579C6E52@TK5EX14MBXC117.redmond.corp.microsoft.com>
Message-Id: <CDD1DDBF-BD1B-4F4E-8620-AA2FEC402C90@lodderstedt.net>
From: Torsten Lodderstedt <torsten@lodderstedt.net>
To: Yaron Goland <yarong@microsoft.com>
In-Reply-To: <7C01E631FF4B654FA1E783F1C0265F8C579C6E52@TK5EX14MBXC117.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-27-725117780"
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (7E18)
Mime-Version: 1.0 (iPhone Mail 7E18)
Date: Sat, 26 Jun 2010 08:09:01 +0200
X-Df-Sender: 141509
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth discovery draft?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Jun 2010 06:09:35 -0000

I think it should be possible to discover a resource's OAuth server  
and its capabilities using a direct Discovery request. I don't think a  
WWW-Authenticate Header is the right representation for this kind of  
data. What about a JSON or XML document returned in response to an  
OPTIONS request (as you suggested) or a GET request with a certain  
content type in its ACCEPT Header?

regards,
Torsten.



Am 23.06.2010 um 20:20 schrieb Yaron Goland <yarong@microsoft.com>:

> No objections on my part. I would rather have a smaller core spec  
> with features that everyone agrees on.
>
>
>
> BTW, a thought for the discovery draft – RFC 2616/2617 only defines  
> www-authenticate’s semantics in the context of a 401. It’s  
> unclear from the draft what it would mean to return a www-authentica 
> te header on a 200 response. The reason I care about this is that I  
> think it makes sense that if someone wants to talk to an endpoint th 
> ey know supports OAuth and need to know where their token issuer loc 
> ation is they would want to fire off an OPTIONS request to the resou 
> rce and find out from the response where the issuer is and what real 
> m is being used. It seems to me that the simplest way to solve this  
> problem is to just return www-authenticate on a 200 response to an O 
> PTIONS request.
>
>
>
>                 Thoughts?
>
>
>
>                                 Thanks,
>
>
>
>                                                 Yaron
>
>
>
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Wednesday, June 23, 2010 11:04 AM
> To: Yaron Goland; James Manger; OAuth WG
> Subject: Re: OAuth discovery draft?
>
>
>
> I think the core work is pretty stable now, unlike the discovery  
> bits which (while simple) are not enjoying the same level of  
> consensus. I think it is much more practical to propose them as a  
> separate document and perhaps consider merging them later on when  
> they reach an equal level of stability. But overall, I’m not too wor 
> ries about multiple documents.
>
> EHL
>
>
> On 6/23/10 11:00 AM, "Yaron Goland" <yarong@microsoft.com> wrote:
>
> I've been noodling [1] a lot about full delegation in OAuth [2] and  
> one of the issues that came out of that was the need for discovering  
> both the location and realm of an endpoint's token server. But at  
> least for my use cases (which consist of walking up to a service and  
> making an options request and getting back a www-authenticate  
> header) all I need back is a realm and a token server URL. In other  
> words just having one argument added to our www-authenticate header  
> would be enough to solve the case where someone wants to walk up to  
> a service and find out where its token server is. Does that really  
> need its own spec? Or can we just add an argument to www- 
> authenticate in the current spec?
>         Thanks,
>                 Yaron
>
> [1] See http://www.goland.org/oauthgenericdelegation/ for an  
> overview of my thinking on full delegation in OAuth. At the very end  
> are links to a bunch of other much more in-depth articles on  
> particular subjects touched on in the main article.
>
> [2] I define 'full delegation' as "User X of Service Y grants  
> permission Z to User A of Service B". Currently OAuth requires X ==  
> A. In the future I hope to see extensions to OAuth that enable what  
> I'm terming 'full delegation'. But personally I'm really happy that  
> OAuth has the X==A restriction. It simplifies a whole host of issues  
> and satisfies a really important use case.
>
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On  
> Behalf
> > Of Eran Hammer-Lahav
> > Sent: Monday, June 21, 2010 9:50 PM
> > To: Manger, James H; OAuth WG (oauth@ietf.org)
> > Subject: Re: [OAUTH-WG] OAuth discovery draft?
> >
> > Yes, it's on my desk and not yet ready, but I am working on one.  
> It includes
> > your sites proposal among other things. I am trying to get the  
> core spec
> > stable this week and focus on that next.
> >
> > EHL
> >
> > > -----Original Message-----
> > > From: Manger, James H [mailto:James.H.Manger@team.telstra.com]
> > > Sent: Monday, June 21, 2010 8:03 PM
> > > To: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org)
> > > Subject: OAuth discovery draft?
> > >
> > > Eran,
> > >
> > > There have been a few mentions recently of an OAuth discovery  
> draft.
> > > Is there any such draft yet, or is this just a part that we know  
> needs
> > > to be done?
> > >
> > > The email on "OAuth meeting notes on -05 (with updates)" said:
> > >
> > > >> 6.1.1. - describing the WWW-Authenticate response header
> > > >>
> > > >> - Discovery needed for various elements
> > > >
> > > > Yes. That's for the discovery draft.
> > >
> > >
> > > A wiki page on "Future OpenID Technical Requirements"
> > > <http://wiki.openid.net/Future-OpenID-Technical-Requirements>  
> says:
> > >
> > > > 6) IdP Discovery
> > > >
> > > >    * Much of this will be covered by OAuth2 Discovery,
> > > >      however OIC may need to define OpenID specific features.
> > > >…
> > > > 17) Simpler discovery
> > > >
> > > >    * See Eran's OAuth Discovery proposal
> > >
> > >
> > > There was an OAuth 1.0 Discovery draft over 2 years ago, but  
> that is tagged:
> > > "expired", "marked as obsolete by its author", "discouraged from
> > > implementing", "no update is expected", "replaced by the OAuth 2.0
> > effort".
> > >
> > > I know I should write a discovery draft myself.
> > >
> > > --
> > > James Manger
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth