Re: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-v2-user-a4c-01.txt
John Bradley <ve7jtb@ve7jtb.com> Wed, 28 August 2013 01:03 UTC
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEA0511E8381 for <oauth@ietfa.amsl.com>; Tue, 27 Aug 2013 18:03:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.297
X-Spam-Level:
X-Spam-Status: No, score=-3.297 tagged_above=-999 required=5 tests=[AWL=0.301, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NKYXKmN+gwcS for <oauth@ietfa.amsl.com>; Tue, 27 Aug 2013 18:03:42 -0700 (PDT)
Received: from mail-ie0-f171.google.com (mail-ie0-f171.google.com [209.85.223.171]) by ietfa.amsl.com (Postfix) with ESMTP id 38AF411E825D for <oauth@ietf.org>; Tue, 27 Aug 2013 18:03:42 -0700 (PDT)
Received: by mail-ie0-f171.google.com with SMTP id 9so7554521iec.2 for <oauth@ietf.org>; Tue, 27 Aug 2013 18:03:41 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=kEkc7ZAgv8BGkfwEvFqOCxduy2m5oxiVWZI0a0Sw+eA=; b=c3Ot/rkNRxDqjrSCv4CzcTvbHtR4225NLotlwxce2DXm3wDljMFfVQxNuSrIlScdK/ vwDEQwyrYiDg4pse/05Q9DmEGdYb6zoo3VtwYkez/z9uJQQUul5ZgmFvfm0F8B4MgUZF q0gtiXxy+xUM6fSOykkuxpvk7R//pHe/Baiyw7aj7qy8F2q4Enj4zlsu1tvXd68sQrG8 Gngr9qDgi2B3ZMYyzDFYB1jfoMhc+WiFi+RbE9tIrjJBmESZjWwuJMfrVIHeThtiRAyj TfC9/77X8udCCPNu349M9wXhIGc5Rgw9Ck9V/Q0qNuS+iQVT6tJWuykmbEkcVPMOHUP/ 9FqA==
X-Gm-Message-State: ALoCoQnu5FbamA1uQIwdVdH9Z6KJA3jzgUqnNxc/cWVRbPzOpkWOoHgoJT3QkV+QO/voU9SUgbC9
X-Received: by 10.50.120.6 with SMTP id ky6mr10706876igb.58.1377651821654; Tue, 27 Aug 2013 18:03:41 -0700 (PDT)
Received: from [192.168.1.216] (190-20-36-119.baf.movistar.cl. [190.20.36.119]) by mx.google.com with ESMTPSA id p5sm1028405igj.10.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 27 Aug 2013 18:03:40 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_AF47C481-9B6F-4238-8E91-6C7CA52DF758"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <B5AA5EB0-A873-4A68-A4ED-3FBAE91F68DB@oracle.com>
Date: Tue, 27 Aug 2013 21:03:28 -0400
Message-Id: <627E09AE-2FDF-4DF9-8DF6-3FC20B51F74A@ve7jtb.com>
References: <20130827155645.1310.29989.idtracker@ietfa.amsl.com> <805A22A4-E086-435E-BBA2-E0A04241A334@oracle.com> <1426A97F-8A71-4297-9F46-C824121D36BB@ve7jtb.com> <B762489A-FFAC-4BB3-822C-15DA085CB6FC@oracle.com> <4D2572FD-2B04-40DA-965F-C5C82B9EE813@ve7jtb.com> <B5AA5EB0-A873-4A68-A4ED-3FBAE91F68DB@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1508)
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-v2-user-a4c-01.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Aug 2013 01:03:46 -0000
The authenticated user is the "sub" scoped to "iss" not the profile URL. A profile URL is informational and may change for the user. I think making it a structured element describing the API is going beyond the "Simple" I was assuming that the profile URI would be under the control of the AS/Issuer and there would be one endpoint per AS like Connect which has a single .well-known for the issuer. Per user discovery uses webfinger to point to public info. now that webfinger is a RFC you could return the users acct: URI for webfinger do the client can get public info. If you want to specify arbitrary protected resources as the profile URI then you are opening a big can of complexity that Connect saves for the Advanced profile with distributed claims, not something you want in the simple profile. You want to avoid the RP using profile url or email as the identifier for the subject. Connect defines its subject tightly in that it must be A locally unique and never reassigned identifier within the Issuer for the End-User, which is intended to be consumed by the Client, e.g., "24400320" or "AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4". It MUST NOT exceed 255 ASCII characters in length. The value is a case sensitive string. Keeping PII out of the subject also saves a lot of grief, and numbers don't have the same pressure for reassignment as other nicknames. John B. On 2013-08-27, at 8:28 PM, Phil Hunt <phil.hunt@oracle.com> wrote: > John, > > I do not what to do anything to specify the profile endpoint. The big problem is there are already many APIs -- user_info is but one. > > The problems in the IETF OAuth space, is that the URL the client "thinks" is the authenticated user is not guaranteed to be the user. For example, the clients assume "facebook.com/me" is the authenticated user -- and in that case it is. But for other APIs there are no aliases. For example, my client could be requesting information about your Facebook endpoint and because I am a friend, the client thinks it just authenticated you. The point of returning the profile url is to ensure that the client knows what the authenticated user's profile URL is. > > I raised the question of whether returning multiple URLs is useful since many cloud providers are actually offering multiple APIs for the same user information. My feeling is that that client already knows what it wants and is merely checking that the value matches its expectations. > > I think the .well-known might be useful, but since this may change on a user-by-user basis, it is problematic. For example, the authenticated user may be federated. What then? > > Phil > > @independentid > www.independentid.com > phil.hunt@oracle.com > > > > > > > > On 2013-08-27, at 4:51 PM, John Bradley <ve7jtb@ve7jtb.com> wrote: > >> I thought you wanted to keep the profile endpoint (user_info) out of this. >> Once you have a user-info type endpoint you get into defining scopes for claims and I thought Tony wanted to avoid this and have it be only session authentication. >> >> Connect publishes its idp config in the .well-known directory of "iss" that allows all the endpoints to be discovered. >> >> Over time the Authorization endpoint URI will change and will contain query parameters etc. tying iss to a logical name like a SAML entityID that could provide the other endpoint information was a more familiar pattern to people. >> >> In some ways Connect duplicates one of the entity-id to meta-data discovery methods in SAML meta-data that never got traction (other than perhaps in ADFS). >> >> John B. >> >> On 2013-08-27, at 7:37 PM, Phil Hunt <phil.hunt@oracle.com> wrote: >> >>> See below. >>> Phil >>> >>> @independentid >>> www.independentid.com >>> phil.hunt@oracle.com >>> >>> >>> >>> On 2013-08-27, at 4:27 PM, John Bradley <ve7jtb@ve7jtb.com> wrote: >>> >>>> It is better. We need to talk about what you have done with "min_alv" vs "acr" from connect which is extensible via a IANA registry of Authentication contexts. >>>> >>>> If it came down to reserving the strings 1 2 3 4 for the ISO29115 reference that could probably be arranged. >>>> >>>> I don't know that throwing an error if the min can't be supported is the correct thing. We had a lot of debate about that and decided that returning the actual acr and letting the client decide was better than an error. >>> [PH[ I agree. >>>> >>>> Also remember that the request is not signed so someone could modify it to remove min_alv and spoof a RP that expects all positive results to meet what it asked for. >>>> >>>> More discussion on min_alv is required. >>> [PH] Yes. Returning what actually was done without an error is a better approach. >>> >>> Also, just noticed that the "hint" parameter should be "login_hint". >>> >>> I think we also need to discuss how the client detects the profile API type and whether the AS can return multiple endpoints (and is that even a good thing). A structured attribute giving endpoint type and URL might be the way to go. >>> >>>> >>>> John B. >>>> >>>> On 2013-08-27, at 12:52 PM, Phil Hunt <phil.hunt@oracle.com> wrote: >>>> >>>>> FYI. Based on feedback from Berlin, Tony and I have revised the draft to include: >>>>> >>>>> * Alignment with OpenID Connect (using id_token) >>>>> * Always returns a JWT >>>>> * Minimum assertion level on request >>>>> * Return information about the type of authentication performed >>>>> >>>>> Thanks for your input. >>>>> >>>>> Phil >>>>> >>>>> @independentid >>>>> www.independentid.com >>>>> phil.hunt@oracle.com >>>>> >>>>> >>>>> Begin forwarded message: >>>>> >>>>>> From: internet-drafts@ietf.org >>>>>> Subject: New Version Notification for draft-hunt-oauth-v2-user-a4c-01.txt >>>>>> Date: 27 August, 2013 8:56:45 AM PDT >>>>>> To: Phil Hunt <phil.hunt@yahoo.com>, Anthony Nadalin <tonynad@microsoft.com>, Tony Nadalin <tonynad@microsoft.com> >>>>>> >>>>>> >>>>>> A new version of I-D, draft-hunt-oauth-v2-user-a4c-01.txt >>>>>> has been successfully submitted by Phil Hunt and posted to the >>>>>> IETF repository. >>>>>> >>>>>> Filename: draft-hunt-oauth-v2-user-a4c >>>>>> Revision: 01 >>>>>> Title: OAuth 2.0 User Authentication and Consent For Clients >>>>>> Creation date: 2013-08-27 >>>>>> Group: Individual Submission >>>>>> Number of pages: 10 >>>>>> URL: http://www.ietf.org/internet-drafts/draft-hunt-oauth-v2-user-a4c-01.txt >>>>>> Status: http://datatracker.ietf.org/doc/draft-hunt-oauth-v2-user-a4c >>>>>> Htmlized: http://tools.ietf.org/html/draft-hunt-oauth-v2-user-a4c-01 >>>>>> Diff: http://www.ietf.org/rfcdiff?url2=draft-hunt-oauth-v2-user-a4c-01 >>>>>> >>>>>> Abstract: >>>>>> This specification defines a new OAuth2 endpoint that enables user >>>>>> authentication session and consent information to be shared with >>>>>> client applications. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Please note that it may take a couple of minutes from the time of submission >>>>>> until the htmlized version and diff are available at tools.ietf.org. >>>>>> >>>>>> The IETF Secretariat >>>>>> >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>> >> >
- [OAUTH-WG] Fwd: New Version Notification for draf… Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Mike Jones
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Anthony Nadalin
- Re: [OAUTH-WG] Fwd: New Version Notification for … Sergey Beryozkin
- Re: [OAUTH-WG] Fwd: New Version Notification for … Sergey Beryozkin
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt