Re: [OAUTH-WG] OAuth discovery draft?
Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 26 June 2010 06:09 UTC
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 57B6F3A635F for <oauth@core3.amsl.com>; Fri, 25 Jun 2010 23:09:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.598
X-Spam-Level:
X-Spam-Status: No, score=-1.598 tagged_above=-999 required=5 tests=[AWL=0.650, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YpnoNgMQK4sm for <oauth@core3.amsl.com>; Fri, 25 Jun 2010 23:09:33 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.14]) by core3.amsl.com (Postfix) with ESMTP id EFA603A67D0 for <oauth@ietf.org>; Fri, 25 Jun 2010 23:09:32 -0700 (PDT)
Received: from [80.187.100.84] (helo=[10.198.192.84]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1OSOa4-0008Oo-MG; Sat, 26 Jun 2010 08:09:34 +0200
References: <7C01E631FF4B654FA1E783F1C0265F8C579C6DC3@TK5EX14MBXC117.redmond.corp.microsoft.com> <C8479A94.363F3%eran@hueniverse.com> <7C01E631FF4B654FA1E783F1C0265F8C579C6E52@TK5EX14MBXC117.redmond.corp.microsoft.com>
Message-Id: <CDD1DDBF-BD1B-4F4E-8620-AA2FEC402C90@lodderstedt.net>
From: Torsten Lodderstedt <torsten@lodderstedt.net>
To: Yaron Goland <yarong@microsoft.com>
In-Reply-To: <7C01E631FF4B654FA1E783F1C0265F8C579C6E52@TK5EX14MBXC117.redmond.corp.microsoft.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-27-725117780"
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (7E18)
Mime-Version: 1.0 (iPhone Mail 7E18)
Date: Sat, 26 Jun 2010 08:09:01 +0200
X-Df-Sender: 141509
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth discovery draft?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Jun 2010 06:09:35 -0000
I think it should be possible to discover a resource's OAuth server and its capabilities using a direct Discovery request. I don't think a WWW-Authenticate Header is the right representation for this kind of data. What about a JSON or XML document returned in response to an OPTIONS request (as you suggested) or a GET request with a certain content type in its ACCEPT Header? regards, Torsten. Am 23.06.2010 um 20:20 schrieb Yaron Goland <yarong@microsoft.com>: > No objections on my part. I would rather have a smaller core spec > with features that everyone agrees on. > > > > BTW, a thought for the discovery draft – RFC 2616/2617 only defines > www-authenticate’s semantics in the context of a 401. It’s > unclear from the draft what it would mean to return a www-authentica > te header on a 200 response. The reason I care about this is that I > think it makes sense that if someone wants to talk to an endpoint th > ey know supports OAuth and need to know where their token issuer loc > ation is they would want to fire off an OPTIONS request to the resou > rce and find out from the response where the issuer is and what real > m is being used. It seems to me that the simplest way to solve this > problem is to just return www-authenticate on a 200 response to an O > PTIONS request. > > > > Thoughts? > > > > Thanks, > > > > Yaron > > > > From: Eran Hammer-Lahav [mailto:eran@hueniverse.com] > Sent: Wednesday, June 23, 2010 11:04 AM > To: Yaron Goland; James Manger; OAuth WG > Subject: Re: OAuth discovery draft? > > > > I think the core work is pretty stable now, unlike the discovery > bits which (while simple) are not enjoying the same level of > consensus. I think it is much more practical to propose them as a > separate document and perhaps consider merging them later on when > they reach an equal level of stability. But overall, I’m not too wor > ries about multiple documents. > > EHL > > > On 6/23/10 11:00 AM, "Yaron Goland" <yarong@microsoft.com> wrote: > > I've been noodling [1] a lot about full delegation in OAuth [2] and > one of the issues that came out of that was the need for discovering > both the location and realm of an endpoint's token server. But at > least for my use cases (which consist of walking up to a service and > making an options request and getting back a www-authenticate > header) all I need back is a realm and a token server URL. In other > words just having one argument added to our www-authenticate header > would be enough to solve the case where someone wants to walk up to > a service and find out where its token server is. Does that really > need its own spec? Or can we just add an argument to www- > authenticate in the current spec? > Thanks, > Yaron > > [1] See http://www.goland.org/oauthgenericdelegation/ for an > overview of my thinking on full delegation in OAuth. At the very end > are links to a bunch of other much more in-depth articles on > particular subjects touched on in the main article. > > [2] I define 'full delegation' as "User X of Service Y grants > permission Z to User A of Service B". Currently OAuth requires X == > A. In the future I hope to see extensions to OAuth that enable what > I'm terming 'full delegation'. But personally I'm really happy that > OAuth has the X==A restriction. It simplifies a whole host of issues > and satisfies a really important use case. > > > -----Original Message----- > > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On > Behalf > > Of Eran Hammer-Lahav > > Sent: Monday, June 21, 2010 9:50 PM > > To: Manger, James H; OAuth WG (oauth@ietf.org) > > Subject: Re: [OAUTH-WG] OAuth discovery draft? > > > > Yes, it's on my desk and not yet ready, but I am working on one. > It includes > > your sites proposal among other things. I am trying to get the > core spec > > stable this week and focus on that next. > > > > EHL > > > > > -----Original Message----- > > > From: Manger, James H [mailto:James.H.Manger@team.telstra.com] > > > Sent: Monday, June 21, 2010 8:03 PM > > > To: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org) > > > Subject: OAuth discovery draft? > > > > > > Eran, > > > > > > There have been a few mentions recently of an OAuth discovery > draft. > > > Is there any such draft yet, or is this just a part that we know > needs > > > to be done? > > > > > > The email on "OAuth meeting notes on -05 (with updates)" said: > > > > > > >> 6.1.1. - describing the WWW-Authenticate response header > > > >> > > > >> - Discovery needed for various elements > > > > > > > > Yes. That's for the discovery draft. > > > > > > > > > A wiki page on "Future OpenID Technical Requirements" > > > <http://wiki.openid.net/Future-OpenID-Technical-Requirements> > says: > > > > > > > 6) IdP Discovery > > > > > > > > * Much of this will be covered by OAuth2 Discovery, > > > > however OIC may need to define OpenID specific features. > > > >… > > > > 17) Simpler discovery > > > > > > > > * See Eran's OAuth Discovery proposal > > > > > > > > > There was an OAuth 1.0 Discovery draft over 2 years ago, but > that is tagged: > > > "expired", "marked as obsolete by its author", "discouraged from > > > implementing", "no update is expected", "replaced by the OAuth 2.0 > > effort". > > > > > > I know I should write a discovery draft myself. > > > > > > -- > > > James Manger > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] OAuth meeting notes on -05 (with updat… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… Torsten Lodderstedt
- [OAUTH-WG] expires_in RE: OAuth meeting notes on … Axel.Nennker
- Re: [OAUTH-WG] expires_in RE: OAuth meeting notes… David Recordon
- Re: [OAUTH-WG] expires_in RE: OAuth meeting notes… Axel.Nennker
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… William Mills
- Re: [OAUTH-WG] expires_in RE: OAuth meeting notes… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… Eran Hammer-Lahav
- [OAUTH-WG] OAuth discovery draft? Manger, James H
- Re: [OAUTH-WG] OAuth discovery draft? Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth discovery draft? Yaron Goland
- Re: [OAUTH-WG] OAuth discovery draft? Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth discovery draft? Yaron Goland
- Re: [OAUTH-WG] OAuth discovery draft? Thomas Hardjono
- Re: [OAUTH-WG] OAuth meeting notes on -05 (with u… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth discovery draft? Yaron Goland
- Re: [OAUTH-WG] OAuth discovery draft? Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth discovery draft? Yaron Goland
- Re: [OAUTH-WG] OAuth discovery draft? William Mills
- Re: [OAUTH-WG] OAuth discovery draft? Yaron Goland
- Re: [OAUTH-WG] OAuth discovery draft? Eran Hammer-Lahav